Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Mozilla Firefox Security Updates(mfsa_2017-10_2017-12)-MAC OS X

Information

Severity

Severity

Critical

Family

Family

General

CVSSv2 Base

CVSSv2 Base

10.0

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

6 years ago

Modified

Modified

5 years ago

Summary

This host is installed with Mozilla Firefox and is prone to multiple vulnerabilities.

Insight

Insight

The multiple flaws exists due to, - An use-after-free in SMIL animation functions, - An use-after-free during transaction processing in the editor, - An uut-of-bounds write with malicious font in Graphite 2, - An Out-of-bounds write in Base64 encoding in NSS, - The buffer overflow in WebGL, - The origin confusion when reloading isolated data:text/html URL, - An use-after-free during focus handling, - An use-after-free in text input selection, - An use-after-free in frame selection, - An use-after-free in nsAutoPtr during XSLT processing, - An use-after-free in nsTArray Length() during XSLT processing, - An use-after-free in txExecutionState destructor during XSLT processing, - An use-after-free with selection during scroll events, - An use-after-free during style changes, - The memory corruption with accessibility and DOM manipulation, - The out-of-bounds write during BinHex decoding, - The buffer overflow while parsing application/http-index-format content, - An out-of-bounds read when HTTP/2 DATA frames are sent with incorrect data, - An out-of-bounds read during glyph processing, - An out-of-bounds read in ConvolvePixel, - An out-of-bounds write in ClearKeyDecryptor, - The vulnerabilities in Libevent library, - The sandbox escape allowing file system read access through file picker, - The sandbox escape through internal feed reader APIs, - The sandbox escape allowing local file system access, - The Potential Buffer overflow in flex-generated code, - An uninitialized values used while parsing application/http-index-format content, - The crash during bidirectional unicode manipulation with animation, - An addressbar spoofing using javascript: URI on Firefox for Android, - An addressbar spoofing with onblur event, - The DRBG flaw in NSS, - The memory corruption when drawing Skia content, - The addressbar spoofing during scrolling with editable content on Firefox for Android, - The HTML injection into RSS Reader feed preview page through TITLE element, - The drag and drop of javascript: URLs can allow for self-XSS, - An incorrect ownership model for Private Browsing information and - The memory safety bugs fixed in Firefox 53 and Firefox ESR 52.1.

Affected Software

Affected Software

Mozilla Firefox version before 53.0 on MAC OS X.

Detection Method

Detection Method

Checks if a vulnerable version is present on the target host.

Solution

Solution

Upgrade to Mozilla Firefox version 53.0 or later.