Mozilla Firefox Multiple Vulnerabilities-01 Nov13 (Mac OS X)

Summary
This host is installed with Mozilla Firefox and is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow attackers to execute arbitrary code, cause a denial of service, spoof the address bar, conduct clickjacking attacks and conduct buffer overflow attacks. Impact Level: System/Application.
Solution
Upgrade to Mozilla Firefox version 25.0 or later, For updates refer to http://www.mozilla.com/en-US/firefox/all.html
Insight
Multiple flaws due to, - Use-after-free vulnerability in the 'nsContentUtils::ContentIsHostIncludingDescendantOf' function. - Improper data initialization in the 'txXPathNodeUtils::getBaseURI' function. - An error in 'Worker::SetEventListener' function in the Web workers implementation. - Use-after-free vulnerability in 'nsEventListenerManager::SetEventHandler' function. - Use-after-free vulnerability in 'nsIOService::NewChannelFromURIWithProxyFlags' function. - Use-after-free vulnerability in the 'nsIPresShell::GetPresContext' function. - Improper handling of the appending of an IFRAME element in 'PDF.js'. - Use-after-free vulnerability in 'nsDocLoader::doStopDocumentLoad' function. - Multiple unspecified vulnerabilities in the browser engine. - Improper restriction of the nature or placement of HTML within a dropdown menu. - Improper memory allocation for unspecified functions by JavaScript engine. - Improper determination of the thread for release of an image object.
Affected
Mozilla Firefox before version 25.0 on Mac OS X
Detection
Get the installed version with the help of detect NVT and check the version is vulnerable or not.
References