Firefox ESR 24.x < 24.7 Multiple Vulnerabilities

This script is Copyright (C) 2014-2016 Tenable Network Security, Inc.

Synopsis :

The remote Windows host contains a web browser that is affected by
multiple vulnerabilities.

Description :

The version of Firefox ESR 24.x installed on the remote host is prior
to 24.7. It is, therefore, affected by the following vulnerabilities :

- When a pair of NSSCertificate structures are added to a
trust domain and then one of them is removed during use,
a use-after-free error occurs which may cause the
application to crash. This crash is potentially
exploitable. (CVE-2014-1544)

- There are multiple memory safety hazards within the
browser engine. These hazards may lead to memory
corruption vulnerabilities, which may allow attackers
to execute arbitrary code. (CVE-2014-1547,

- There is a potential use-after-free issue in
DirectWrite font handling. This may allow an attacker
to potentially execute arbitrary code within the context
of the user running the application. (CVE-2014-1551)

- Triggering the FireOnStateChange event has the
potential to crash the application. This may lead to
a use-after-free and an exploitable crash.

- When using the Cesium JavaScript library to generate
WebGL content, the application may crash. This crash
is potentially exploitable. (CVE-2014-1556)

- There is a flaw in the Skia library when scaling images
of high quality. If the image data is discarded while
being processed, the library may crash. This crash
is potentially exploitable. (CVE-2014-1557)

See also :

Solution :

Upgrade to Firefox ESR 24.7 or later.

Risk factor :

High / CVSS Base Score : 9.3
CVSS Temporal Score : 6.9
Public Exploit Available : false

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now