Descripción: | Summary: Mozilla Firefox is prone to multiple vulnerabilities.
Vulnerability Insight: Multiple flaws are due to:
- The 'nsCSPContext::SendReports' function in 'dom/security/nsCSPContext.cpp' script does not prevent use of a non-HTTP report-uri for a CSP violation report.
- The CSP violation reports contained full path information for cross-origin iframe navigations in violation of the CSP specification.
- A memory leak in the libstagefright library when array destruction occurs during MPEG4 video file processing.
- An error in 'browser/base/content/browser.js' script.
- Multiple use-after-free issues.
- Multiple out-of-bounds read errors
- A memory corruption vulnerability in the FileReader class.
- The mishandling of a navigation sequence that returns to the original page.
- Improper restriction of the availability of IFRAME Resource Timing API times.
- Integer underflow in Brotli library's decompression.
- A memory corruption issue in NPAPI plugin in 'nsNPObjWrapper::GetNewOrUsed' function in 'dom/plugins/base/nsJSNPRuntime.cpp' script.
- A race condition in the 'GetStaticInstance' function in the WebRTC implementation.
- Multiple Heap-based buffer overflow vulnerabilities.
- The multiple unspecified vulnerabilities in the browser engine.
Vulnerability Impact: Successful exploitation will allow remote attackers to execute arbitrary code or to cause a denial of service, possibly gain privileges, to bypass the Same Origin Policy, to obtain sensitive information and to do spoofing attacks.
Affected Software/OS: Mozilla Firefox version before 45.0 on Mac OS X.
Solution: Upgrade to Mozilla Firefox version 45.0 or later.
CVSS Score: 10.0
CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
|