Vulnerability  oval:org.mitre.oval:def:19133
PDF.js in Mozilla Firefox before 25.0 and Firefox ESR 24.x before 24.1 does not properly handle the appending of an IFRA...  

PDF.js in Mozilla Firefox before 25.0 and Firefox ESR 24.x before 24.1 does not properly handle the appending of an IFRAME element, which allows remote attackers to read arbitrary files or execute arbitrary JavaScript code with chrome privileges by using this element within an embedded PDF object.
Create Date: 2013-11-01 Last Update Date: 2014-10-06

Affected Platforms/Products

Affected Products (CPE + CVE references)
Platforms: windows (from OVAL definitions) Products: windows
  • Microsoft Windows Server 2012
  • Microsoft Windows 8
  • Microsoft Windows 2000
  • Microsoft Windows XP
  • Microsoft Windows Server 2003
  • Microsoft Windows Vista
  • Microsoft Windows Server 2008
  • Microsoft Windows 7
  • Mozilla Firefox
  • Mozilla Firefox ESR

References

Criteria

The system is vulnerable
IF : Any one of the following are true
IF : All of the following are true Check for vulnerable Mozilla Firefox ESR
Prerequisites (Extended Definitions)
Mozilla Firefox ESR is installed oval:org.mitre.oval:def:22414
IF : Mozilla Firefox ESR version is less than 24.1 and greater than or equal to 24.x
Windows : File Test :  Mozilla Firefox ESR version is less than 24.1 and greater than or equal to 24.x 
At least one of the objects listed below must exist on the system (Existence check)
Windows : File Object holds the filepath to firefox.exe (ESR version)
[regex_capture=[[[path of ${{independent:textfilecontent54_object:oval:org.mitre.oval:obj:29411}}]]]][pattern=^(.*)\\defaults.*$] \firefox.exe
If ALL of the individual results for the objects listed below are true
All of the following conditions must be satisfied
product_version less than 24.1 (datatype=version)
State matching version is less than to 24.1 windows : file_state 
product_version greater than or equal 24.0 (datatype=version)
State matching version is greater than or equal to 24.0 windows : file_state 
IF : All of the following are true Check for vulnerable Firefox mainline
Prerequisites (Extended Definitions)
Mozilla Firefox Mainline release is installed oval:org.mitre.oval:def:22259
IF : Mozilla Firefox Mainline version is greater than or equal to 0.1
Windows : File Test :  Mozilla Firefox Mainline version is greater than or equal to 0.1 
At least one of the objects listed below must exist on the system (Existence check)
Windows : File Object holds the filepath to firefox.exe (Mainline version)
[regex_capture=[[[path of ${{independent:textfilecontent54_object:oval:org.mitre.oval:obj:29644}}]]]][pattern=^(.*)\\defaults.*$] \firefox.exe
product_version greater than or equal 0.1 (datatype=version)
Product version is greater than or equal to 0.1 windows : file_state 
IF : Mozilla Firefox Mainline version is less than 25.0
Windows : File Test :  Mozilla Firefox Mainline version is less than 25.0 
At least one of the objects listed below must exist on the system (Existence check)
Windows : File Object holds the filepath to firefox.exe (Mainline version)
[regex_capture=[[[path of ${{independent:textfilecontent54_object:oval:org.mitre.oval:obj:29644}}]]]][pattern=^(.*)\\defaults.*$] \firefox.exe
product_version less than 25.0 (datatype=version)
Product version is less than 25.0 windows : file_state 

Quick Help

References To Objects
[[ .. ${{...}}]] are refences to values of other objects.
Unresolved variable or object references
Oval definitions use objects referenced by other objects to define complex data structures. Sometimes you may see that a link to object/variable details page instead of the actual value of an object or variable is displayed. This is caused by the recursion depth limit used to prevent excessive web server resource usage.
Other Help Topics
Data Types
What is an Object?
What is a State?
What is a Test?
Other Help Topics
Regular Expression Patterns
Some object or state definitions are defined as regular expression patterns, you should interpret the regexp pattern while evaluating them.

OVAL Definitions By Referenced Objects

How does it work?   User agreement and privacy statement   About & Contact
CVE is a registred trademark of the MITRE Corporation and the authoritive source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritive source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritive source of OVAL content is MITRE's OVAL web site.
Warning: This site and all data are provided as is. It is not guaranteed that all information is accurate and complete. Use any information provided on this site at your own risk. By using this site you accept that you know that these data are provided as is and not guaranteed to be accurate, correct or complete. All trademarks appearing on this site are the property of their respective owners in the US or other countries. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss. PLEASE SEE nvd.nist.gov and oval.mitre.org for more details about OVAL language and definitions.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor/web site owner/maintainer be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
Use of OVAL and all related data is subject to terms of use defined by Mitre at http://oval.mitre.org/oval/about/termsofuse.html