Korean
<< Back
VID 28880
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description The version of Firefox installed on the remote Windows host is prior to 46. It is, therefore, affected by multiple vulnerabilities :

- Multiple memory corruption issues exist that allow an attacker to corrupt memory, resulting in the execution of arbitrary code. (CVE-2016-2804, CVE-2016-2806, CVE-2016-2807)

- A flaw exists due to improper validation of user-supplied input when handling the 32-bit generation count of the underlying HashMap. A context-dependent attacker can exploit this to cause a buffer overflow condition, resulting in a denial of service or the execution of arbitrary code. (CVE-2016-2808)

- A local privilege escalation vulnerability exists in the Maintenance Service updater due to improper handling of long log file paths. A local attacker can exploit this to delete arbitrary files and gain elevated privileges. (CVE-2016-2809)

- A remote code execution vulnerability exists due to a use-after-free error in the BeginReading() function. A context-dependent attacker can exploit this to dereference already freed memory, resulting in the execution of arbitrary code. (CVE-2016-2811)

- A remote code execution vulnerability exists due to a race condition in ServiceWorkerManager in the get() function. A context-dependent attacker can exploit this to execute arbitrary code. (CVE-2016-2812)

- A heap buffer overflow condition exists in the Google Stagefright component due to improper validation of user-supplied input when handling CENC offsets and the sizes table. A context-dependent attacker can exploit this to cause a denial of service condition or the execution of arbitrary code. (CVE-2016-2814)

- A security bypass vulnerability exists due to the Content Security Policy (CSP) not being properly applied to web content sent with the 'multipart/x-mixed-replace' MIME-type. A context-dependent attacker can exploit this to bypass CSP protection. (CVE-2016-2816)

- A cross-site scripting (XSS) vulnerability exists due to improper restriction of unprivileged 'javascript: URL' navigation. A context-dependent attacker can exploit this, via a specially crafted request, to execute arbitrary script code in the context of a user's browser session. (CVE-2016-2817)

- A flaw exists in the Firefox Health Report that is triggered when it accepts any content document events that are presented in its iframe. A context-dependent attacker can exploit this to manipulate sharing preferences. (CVE-2016-2820)

* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
https://www.mozilla.org/en-US/security/advisories/mfsa2016-39/
https://www.mozilla.org/en-US/security/advisories/mfsa2016-40/
https://www.mozilla.org/en-US/security/advisories/mfsa2016-42/
https://www.mozilla.org/en-US/security/advisories/mfsa2016-44/
https://www.mozilla.org/en-US/security/advisories/mfsa2016-45/
https://www.mozilla.org/en-US/security/advisories/mfsa2016-46/
https://www.mozilla.org/en-US/security/advisories/mfsa2016-47/
https://www.mozilla.org/en-US/security/advisories/mfsa2016-48/

* Platforms Affected:
Mozilla Foundation, Firefox versions prior to 46
Any operating system Any version
Recommendation Upgrade to the latest version of Firefox (46 or later), available from the Mozilla Web site at http://www.mozilla.com/firefox/
Related URL CVE-2016-2804,CVE-2016-2806,CVE-2016-2807,CVE-2016-2808,CVE-2016-2809,CVE-2016-2811,CVE-2016-2812,CVE-2016-2814,CVE-2016-2816,CVE-2016-2817 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)