Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.811850
Category:General
Title:Mozilla Firefox Security Advisories (MFSA2017-21, MFSA2017-22) - Mac OS X
Summary:Mozilla Firefox is prone to multiple vulnerabilities.
Description:Summary:
Mozilla Firefox is prone to multiple vulnerabilities.

Vulnerability Insight:
Multiple flaws exist due to:

- Use-after-free error in with Fetch API.

- Use-after-free error in during ARIA array manipulation.

- Use-after-free error in while resizing images in design mode.

- Buffer overflow error in when drawing and validating elements with ANGLE.

- Use-after-free error in TLS 1.2 generating handshake hashes.

- Drag and drop of malicious page content to the tab bar can open locally stored files.

- Blob and data URLs bypass phishing and malware protection warnings.

- Integer truncation in the JavaScript parser.

- OS X fonts render some Tibetan and Arabic unicode characters as spaces.

- Spoofing attack with modal dialogs on non-e10s installations.

- Web Extensions can load about: URLs in extension UI.

- Web Extensions can download and open non-executable files without user interaction.

- CSP sandbox directive did not create a unique origin.

- Web Crypto allows AES-GCM with 0-length IV.

- Xray wrapper bypass with new tab and web console.

- Memory safety bugs fixed in Firefox 56.

Vulnerability Impact:
Successful exploitation of these
vulnerabilities will allow remote attackers to cause denial of service, conduct
spoofing attack, obtain sensitive information and execute arbitrary code.

Affected Software/OS:
Mozilla Firefox version before
56.0 on Mac OS X.

Solution:
Upgrade to Mozilla Firefox version 56.0
or later.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2017-7793
BugTraq ID: 101055
http://www.securityfocus.com/bid/101055
Debian Security Information: DSA-3987 (Google Search)
https://www.debian.org/security/2017/dsa-3987
Debian Security Information: DSA-4014 (Google Search)
https://www.debian.org/security/2017/dsa-4014
https://security.gentoo.org/glsa/201803-14
https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html
RedHat Security Advisories: RHSA-2017:2831
https://access.redhat.com/errata/RHSA-2017:2831
RedHat Security Advisories: RHSA-2017:2885
https://access.redhat.com/errata/RHSA-2017:2885
http://www.securitytracker.com/id/1039465
Common Vulnerability Exposure (CVE) ID: CVE-2017-7818
Common Vulnerability Exposure (CVE) ID: CVE-2017-7819
Common Vulnerability Exposure (CVE) ID: CVE-2017-7824
BugTraq ID: 101053
http://www.securityfocus.com/bid/101053
Common Vulnerability Exposure (CVE) ID: CVE-2017-7812
BugTraq ID: 101057
http://www.securityfocus.com/bid/101057
Common Vulnerability Exposure (CVE) ID: CVE-2017-7814
BugTraq ID: 101059
http://www.securityfocus.com/bid/101059
Common Vulnerability Exposure (CVE) ID: CVE-2017-7813
Common Vulnerability Exposure (CVE) ID: CVE-2017-7825
Common Vulnerability Exposure (CVE) ID: CVE-2017-7815
Common Vulnerability Exposure (CVE) ID: CVE-2017-7816
Common Vulnerability Exposure (CVE) ID: CVE-2017-7821
Common Vulnerability Exposure (CVE) ID: CVE-2017-7823
Common Vulnerability Exposure (CVE) ID: CVE-2017-7822
Common Vulnerability Exposure (CVE) ID: CVE-2017-7820
Common Vulnerability Exposure (CVE) ID: CVE-2017-7811
Common Vulnerability Exposure (CVE) ID: CVE-2017-7810
BugTraq ID: 101054
http://www.securityfocus.com/bid/101054
https://usn.ubuntu.com/3688-1/
Common Vulnerability Exposure (CVE) ID: CVE-2017-7805
Debian Security Information: DSA-3998 (Google Search)
https://www.debian.org/security/2017/dsa-3998
RedHat Security Advisories: RHSA-2017:2832
https://access.redhat.com/errata/RHSA-2017:2832
CopyrightCopyright (C) 2017 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.