Mozilla Firefox ESR < 52.8.1 RCE

High Nessus Network Monitor Plugin ID 700338

Synopsis

The remote host has a web browser installed that is vulnerable to a Remote Code Execution (RCE) attack vector.

Description

Versions of Mozilla Firefox ESR earlier than 52.8.1 are unpatched for an overflow condition exists in the 'SkScan::FillPath()' function in 'core/SkScan_Path.cpp' that is triggered as certain input is not properly validated when drawing paths with anti-aliasing turned off. This may allow a context-dependent attacker to cause a heap-based buffer overflow, resulting in a denial of service in a process linked against the library or potentially allowing the execution of arbitrary code.

Solution

Upgrade to Firefox ESR version 52.8.1 or later.

See Also

https://www.mozilla.org/en-US/security/advisories/mfsa2018-14

Plugin Details

Severity: High

ID: 700338

Family: Web Clients

Published: 2018/08/21

Updated: 2019/03/06

Dependencies: 9131

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

CVSS v3.0

Base Score: 8.1

Temporal Score: 7.5

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

Patch Publication Date: 2018/05/18

Vulnerability Publication Date: 2018/05/18

Reference Information

CVE: CVE-2018-6126