Firefox ESR < 38.2.1 Multiple Vulnerabilities

High Nessus Plugin ID 85688


The remote Windows host contains a web browser that is affected by multiple vulnerabilities.


The version of Mozilla Firefox ESR installed on the remote Windows host is prior to 38.2.1. It is, therefore, affected by the following vulnerabilities :

- A use-after-free error exists when handling restyling operations during the resizing of canvas elements due to the canvas references being recreated, thus destroying the original references. A remote, unauthenticated attacker can exploit this to deference already freed memory, resulting in a denial of service condition or the execution of arbitrary code. (CVE-2015-4497)

- A security feature bypass vulnerability exists due to a flaw that allows the manipulation of the 'data:' URL on a loaded web page without install permission prompts being displayed to the user. A remote, unauthenticated attacker can exploit this to install add-ons from a malicious source. (CVE-2015-4498)


Upgrade to Firefox ESR 38.2.1 or later.

See Also

Plugin Details

Severity: High

ID: 85688

File Name: mozilla_firefox_38_2_1_esr.nasl

Version: 1.6

Type: local

Agent: windows

Family: Windows

Published: 2015/08/28

Updated: 2018/07/16

Dependencies: 20862

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:firefox_esr

Required KB Items: Mozilla/Firefox/Version

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2015/08/27

Vulnerability Publication Date: 2015/08/27

Reference Information

CVE: CVE-2015-4497, CVE-2015-4498