Mozilla Firefox ESR Multiple Vulnerabilities-02 Nov13 (Windows)

Summary
This host is installed with Mozilla Firefox ESR and is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow attackers to execute arbitrary code, cause a denial of service and conduct buffer overflow attacks. Impact Level: System/Application.
Solution
Upgrade to Mozilla Firefox ESR version 17.0.10 or 24.1 or later, For updates refer http://www.mozilla.org/en-US/firefox/organizations/all.html
Insight
Multiple flaws due to, - Improper data initialization in the 'txXPathNodeUtils::getBaseURI' function. - An error in 'Worker::SetEventListener' function in Web workers implementation. - Use-after-free vulnerability in the 'nsEventListenerManager::SetEventHandler' function. - Use-after-free vulnerability in 'nsIOService::NewChannelFromURIWithProxyFlags' function. - Use-after-free vulnerability in the 'nsIPresShell::GetPresContext' function. - Use-after-free vulnerability in 'nsDocLoader::doStopDocumentLoad' function. - Multiple unspecified vulnerabilities in the browser engine. - Improper memory allocation for unspecified functions by JavaScript engine.
Affected
Mozilla Firefox ESR version 17.x before 17.0.10 and 24.x before 24.1 on Windows.
Detection
Get the installed version with the help of detect NVT and check the version is vulnerable or not.
References