This script is Copyright (C) 2009-2014 Tenable Network Security, Inc.
The remote openSUSE host is missing a security update.
This update fixes a bug in the Mozilla NSPR helper libraries, which
could be used by remote attackers to potentially execute code via
MFSA 2009-59 / CVE-2009-1563: Security researcher Alin Rad Pop of
Secunia Research reported a heap-based buffer overflow in Mozilla's
string to floating point number conversion routines. Using this
containing a very long string to be converted to a floating point
number which would result in improper memory allocation and the
execution of an arbitrary memory location. This vulnerability could
thus be leveraged by the attacker to run arbitrary code on a victim's
See also :
Update the affected mozilla-nspr packages.
Risk factor :
Medium / CVSS Base Score : 6.8