Korean
<< Back
VID 28882
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description The version of Mozilla Firefox installed on the remote Windows host is prior to 50.0. It is, therefore, affected by multiple vulnerabilities, the majority of which are remote code execution vulnerabilities. An unauthenticated, remote attacker can exploit these vulnerabilities by convincing a user to visit a specially crafted website, resulting in the execution of arbitrary code in the context of the current user.

* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
https://www.mozilla.org/en-US/security/advisories/mfsa2016-89/

* Platforms Affected:
Mozilla Foundation, Firefox versions prior to 50
Any operating system Any version
Recommendation Upgrade to the latest version of Firefox (50 or later), available from the Mozilla Web site at http://www.mozilla.com/firefox/
Related URL CVE-2016-5289,CVE-2016-5290,CVE-2016-5291,CVE-2016-5292,CVE-2016-5293,CVE-2016-5294,CVE-2016-5295,CVE-2016-5296,CVE-2016-5297,CVE-2016-9063 (CVE)
Related URL 94335,94336,94337,94339,94341 (SecurityFocus)
Related URL (ISS)