Mozilla Firefox ESR < 52.8.1 RCE

high Nessus Network Monitor Plugin ID 700338


The remote host has a web browser installed that is vulnerable to a Remote Code Execution (RCE) attack vector.


Versions of Mozilla Firefox ESR earlier than 52.8.1 are unpatched for an overflow condition exists in the 'SkScan::FillPath()' function in 'core/SkScan_Path.cpp' that is triggered as certain input is not properly validated when drawing paths with anti-aliasing turned off. This may allow a context-dependent attacker to cause a heap-based buffer overflow, resulting in a denial of service in a process linked against the library or potentially allowing the execution of arbitrary code.


Upgrade to Firefox ESR version 52.8.1 or later.

See Also

Plugin Details

Severity: High

ID: 700338

Family: Web Clients

Published: 8/21/2018

Updated: 11/6/2019

Dependencies: 9131

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

CVSS v3.0

Base Score: 8.1

Temporal Score: 7.5

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*

Patch Publication Date: 5/18/2018

Vulnerability Publication Date: 5/18/2018

Reference Information

CVE: CVE-2018-6126