Mozilla Firefox ESR < 60.0.2 RCE

High Nessus Network Monitor Plugin ID 700340


The remote host has a web browser installed that is vulnerable to a Remote Code Execution (RCE) attack vector.


Versions of Mozilla Firefox ESR earlier than 60.0.2 are unpatched for the following vulnerabilities :

- An overflow condition exists in the 'SkScan::FillPath()' function in 'core/SkScan_Path.cpp' that is triggered as certain input is not properly validated when drawing paths with anti-aliasing turned off. This may allow a context-dependent attacker to cause a heap-based buffer overflow, resulting in a denial of service in a process linked against the library or potentially allowing the execution of arbitrary code.


Upgrade to Firefox ESR version 60.0.2 or later.

See Also

Plugin Details

Severity: High

ID: 700340

Family: Web Clients

Published: 2018/08/21

Updated: 2019/11/06

Dependencies: 9131

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

CVSS v3.0

Base Score: 8.1

Temporal Score: 7.5

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:firefox_esr

Patch Publication Date: 2018/05/18

Vulnerability Publication Date: 2018/05/18

Reference Information

CVE: CVE-2018-6126