Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Mozilla Firefox ESR Security Updates(mfsa_2018-15_2018-17)-Windows

Information

Severity

Severity

Critical

Family

Family

General

CVSSv2 Base

CVSSv2 Base

10.0

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

5 years ago

Modified

Modified

4 years ago

Summary

This host is installed with Mozilla Firefox ESR and is prone to multiple vulnerabilities.

Insight

Insight

The multiple flaws exists due to, - Buffer overflow error using computed size of canvas element. - Multiple use-after-free errors. - Multiple integer overflow errors. - Compromised IPC child process can list local filenames. - Media recorder segmentation fault error when track type is changed during capture. - Invalid data handling during QCMS transformations. - No warning when opening executable SettingContent-ms files. - Timing attack mitigation of PerformanceNavigationTiming. - WebExtensions bundled with embedded experiments were not correctly checked for proper authorization. - Memory safety bugs.

Affected Software

Affected Software

Mozilla Firefox ESR version before 60.1 on Windows.

Detection Method

Detection Method

Checks if a vulnerable version is present on the target host.

Solution

Solution

Upgrade to Mozilla Firefox ESR version 60.1 or later. Please see the references for more information.