Lucene search

K
nessusTenable9987.PRM
HistoryMar 08, 2017 - 12:00 a.m.

Mozilla Firefox ESR < 45.8 Multiple Vulnerabilities

2017-03-0800:00:00
Tenable
www.tenable.com
9

Versions of Mozilla Firefox ESR earlier than 45.8 are unpatched for the following vulnerabilities :

  • An unspecified flaw exists that is triggered as certain input is not properly validated. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code.
  • A flaw exists in ‘js/src/jsgc.cpp’ that is triggered as certain input is not properly validated when handling zone groups. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code.
  • An unspecified flaw exists in ‘netwerk/streamconv/converters/nsMultiMixedConv.cpp’ that is triggered as certain input is not properly validated. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code.
  • A flaw exists in ‘netwerk/cache/nsDiskCacheDeviceSQL.cpp’ that is triggered when handling cache eviction. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code.- A use-after-free condition exists that is triggered when handling NPAPI plugin references. This may allow a context-dependent attacker to dereference already freed memory and potentially execute arbitrary code.
  • A flaw exists in ‘dom/base/nsDocument.cpp’ that is triggered when handling frame request callbacks rescheduling. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code.
  • A flaw exists in the ‘js::array_sort()’ function in ‘js/src/jsarray.cpp’ that is triggered as certain input is not properly validated. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code.
  • A flaw exists in the ‘cairo_cff_font_write_cid_fontdict()’ function in ‘cairo-cff-subset.c’ that is triggered as certain input is not properly validated. This may allow a context-dependent attacker to corrupt memory and crash a process linked against the library or potentially execute arbitrary code.
  • A use-after-free error exists in the ‘FontFaceSet’ class in ‘layout/style/FontFaceSet.cpp’ that is triggered when handling events for FontFace objects. This may allow a context-dependent attacker to dereference already freed memory and potentially execute arbitrary code.
  • A flaw exists in the JavaScript Garbage Collection mechanism that is triggered during incremental sweeping on memory cleanups. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code.
  • A flaw exists in ‘dom/bindings/ErrorResult.h’ that is triggered when handling ErrorResult references. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code.
  • A use-after-free error exists that is triggered when handling ranges in selections with one node inside and one node outside of a native anonymous tree. This may allow a context-dependent attacker to dereference already freed memory and potentially execute arbitrary code.
  • A flaw exists in the ‘HTMLTrackElement::LoadResource()’ function in ‘dom/html/HTMLTrackElement.cpp’ that is triggered as CORS headers are not checked when loading video captions. This may allow a context-dependent attacker to disclose video captions.
  • A path truncation flaw exist in the ‘NS_main()’ function in ‘toolkit/mozapps/update/updater/updater.cpp’ that is triggered when passing callback parameters through the Mozilla Maintenance Service. This may allow a local attacker to delete arbitrary files with elevated privileges.
  • A flaw exists in the ‘FilterNodeLightingSoftware::SetAttribute()’ function template in ‘gfx/2d/FilterNodeSoftware.cpp’ that is triggered when handling subnormal surfaceScale values. With a specially crafted SVG filter, a context-dependent attacker can perform a side-channel attack, potentially resulting in disclosure of history information or text values across domains.
Binary data 9987.prm
VendorProductVersionCPE
mozillafirefox_esrcpe:/a:mozilla:firefox_esr