Mozilla Firefox ESR < 60.0.2 RCE

high Nessus Network Monitor Plugin ID 700340

Synopsis

The remote host has a web browser installed that is vulnerable to a Remote Code Execution (RCE) attack vector.

Description

Versions of Mozilla Firefox ESR earlier than 60.0.2 are unpatched for the following vulnerabilities :

- An overflow condition exists in the 'SkScan::FillPath()' function in 'core/SkScan_Path.cpp' that is triggered as certain input is not properly validated when drawing paths with anti-aliasing turned off. This may allow a context-dependent attacker to cause a heap-based buffer overflow, resulting in a denial of service in a process linked against the library or potentially allowing the execution of arbitrary code.

Solution

Upgrade to Firefox ESR version 60.0.2 or later.

See Also

https://www.mozilla.org/en-US/security/advisories/mfsa2018-14

Plugin Details

Severity: High

ID: 700340

Family: Web Clients

Published: 8/21/2018

Updated: 11/6/2019

Risk Information

VPR

Risk Factor: High

Score: 8.4

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: High

Base Score: 8.1

Temporal Score: 7.5

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:firefox_esr

Patch Publication Date: 5/18/2018

Vulnerability Publication Date: 5/18/2018

Reference Information

CVE: CVE-2018-6126