SynopsisThe remote host has a web browser installed that is vulnerable to multiple attack vectors.
DescriptionVersions of Mozilla Firefox ESR 4.x earlier than 45.1 are unpatched for the following vulnerabilities :
- Multiple memory corruption issues exist that allow an attacker to corrupt memory, resulting in the execution of arbitrary code. (CVE-2016-2805, CVE-2016-2807)
- Multiple flaws exist in that are triggered as user-supplied input is not properly validated. These flaws may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code. (CVE-2016-2806)
- A flaw exists due to improper validation of user-supplied input when handling the 32-bit generation count of the underlying HashMap. A context-dependent attacker can exploit this to cause a buffer overflow condition, resulting in a denial of service or the execution of arbitrary code. (CVE-2016-2808)
- A heap buffer overflow condition exists in the Google Stagefright component due to improper validation of user-supplied input when handling CENC offsets and the sizes table. A context-dependent attacker can exploit this to cause a denial of service condition or the execution of arbitrary code. (CVE-2016-2814)
SolutionUpgrade to Firefox ESR version 45.1 or later.