VID |
28904 |
Severity |
30 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The version of Mozilla Firefox installed on the remote Windows host is prior to 57.0.4. It is, therefore, vulnerable to a speculative execution side-channel attack. Code from a malicious web page could read data from other web sites or private data from the browser itself.
* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: https://www.mozilla.org/en-US/security/advisories/mfsa2018-01/ https://spectreattack.com/
* Platforms Affected: Mozilla Foundation, Firefox versions prior to 57.0.4 Any operating system Any version |
Recommendation |
Upgrade to the latest version of Firefox (57.0.4 or later), available from the Mozilla Web site at http://www.mozilla.com/firefox/ |
Related URL |
CVE-2017-5753,CVE-2017-5715 (CVE) |
Related URL |
102376,102371 (SecurityFocus) |
Related URL |
(ISS) |
|