VID |
28667 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
A version of Mozilla Suite which is older than 1.7.12 is detected as installed on the host. Mozilla is an open-source based Web browser, developed by the Mozilla project. Mozilla Suite versions prior to 1.7.12 are vulnerable to multiple vulnerabilities. An attacker could exploit these vulnerabilities by hosting a malicious page on a Web site or by sending it within an HTML email. An attacker who successfully exploited the most severe of these vulnerabilities could execute arbitrary code on the affected host.
* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://security-protocols.com/advisory/sp-x17-advisory.txt http://www.mozilla.org/security/idn.html http://www.kb.cert.org/vuls/id/573857 http://www.ciac.org/ciac/bulletins/p-303.shtml http://www.frsirt.com/english/advisories/2005/1690 http://secunia.com/advisories/16764/ http://secunia.com/advisories/16766/ http://secunia.com/advisories/16767/
* Platforms Affected: Mozilla Project, Mozilla Suite versions prior to 1.7.12 Microsoft Windows Any version Linux Any version Unix Any version |
Recommendation |
No upgrade or patch available as of September 2005.
Upgrade to the latest version of Mozilla Suite (1.7.12 or later), when new fixed version becomes available from the Mozilla Suite Download Web page at http://www.mozilla.org/products/mozilla1.x/
As a workaround, disable IDN in the browser following the instructions in the vendor's advisory, as listed in the Mozilla Security Advisory dated September 6, 2005 at http://www.mozilla.org/security/idn.html |
Related URL |
CVE-2005-2602,CVE-2005-2871 (CVE) |
Related URL |
14526,14784 (SecurityFocus) |
Related URL |
21754,22207 (ISS) |
|