VID |
28882 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The version of Mozilla Firefox installed on the remote Windows host is prior to 50.0. It is, therefore, affected by multiple vulnerabilities, the majority of which are remote code execution vulnerabilities. An unauthenticated, remote attacker can exploit these vulnerabilities by convincing a user to visit a specially crafted website, resulting in the execution of arbitrary code in the context of the current user.
* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: https://www.mozilla.org/en-US/security/advisories/mfsa2016-89/
* Platforms Affected: Mozilla Foundation, Firefox versions prior to 50 Any operating system Any version |
Recommendation |
Upgrade to the latest version of Firefox (50 or later), available from the Mozilla Web site at http://www.mozilla.com/firefox/ |
Related URL |
CVE-2016-5289,CVE-2016-5290,CVE-2016-5291,CVE-2016-5292,CVE-2016-5293,CVE-2016-5294,CVE-2016-5295,CVE-2016-5296,CVE-2016-5297,CVE-2016-9063 (CVE) |
Related URL |
94335,94336,94337,94339,94341 (SecurityFocus) |
Related URL |
(ISS) |
|