This script is Copyright (C) 2014-2016 Tenable Network Security, Inc.
The remote Windows host contains a web browser that is affected by
The version of Firefox ESR 31.x installed on the remote Windows host
is prior to 31.3. It is, therefore, affected by the following
- A remote code execution vulnerability exists in Mozilla
Network Security Services (NSS) due to a flaw in
'quickder.c' that is triggered when handling PKCS#1
signatures during the decoding of ASN.1 DER.
- Multiple memory safety flaws exist within the browser
engine. Exploiting these, an attacker can cause a denial
of service or execute arbitrary code. (CVE-2014-1587,
- A denial of service vulnerability exists due to
XMLHttpRequest API which can result in a crash.
- A use-after-free error exists due the creation of a
second XML root element when parsing HTML written to a
document created with 'document.open()' function which
can result in arbitrary code execution. (CVE-2014-1592)
- A buffer overflow vulnerability exists in the
'mozilla::FileBlockCache::Read' function when parsing
media which can result in arbitrary code execution.
- A casting error exists when casting from the
'BasicThebesLayer' layer to the 'BasicContainerLayer'
layer which can result in arbitrary code execution.
See also :
Upgrade to Firefox ESR 31.3 or later.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 6.9
Public Exploit Available : false
Nessus Plugin ID: 79664 ()
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now