VID |
28961 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The version of Firefox installed on the remote Windows host is prior to 136.0.4. It is, therefore, affected by a vulnerability as referenced in the mfsa2025-19 advisory.
- Following the recent Chrome sandbox escape (CVE-2025-2783), various Firefox developers identified a similar pattern in our IPC code. A compromised child process could cause the parent process to return an unintentionally powerful handle, leading to a sandbox escape. The original vulnerability was being exploited in the wild. This only affects Firefox on Windows. Other operating systems are unaffected. (CVE-2025-2857)
* References: https://www.mozilla.org/en-US/security/advisories/mfsa2025-19/
* Platforms Affected: Mozilla Foundation, Firefox versions prior to 136.0.4 Any operating system Any version |
Recommendation |
Upgrade to the latest version of Firefox (136.0.4 or later), available from the Mozilla Web site at http://www.mozilla.com/firefox/ |
Related URL |
CVE-2025-2857 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|