VID |
28917 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The version of Firefox installed on the remote Windows host is prior to 67.0.4. It is, therefore, affected by a vulnerability as referenced in the mfsa2019-19 advisory.
- Insufficient vetting of parameters passed with the Prompt:Open IPC message between child and parent processes can result in the non-sandboxed parent process opening web content chosen by a compromised child process. When combined with additional vulnerabilities this could result in executing arbitrary code on the user's computer. (CVE-2019-11708)
* References: https://www.mozilla.org/en-US/security/advisories/mfsa2019-19/
* Platforms Affected: Mozilla Foundation, Firefox versions prior to 67.0.4 Any operating system Any version |
Recommendation |
Upgrade to the latest version of Firefox (67.0.4 or later), available from the Mozilla Web site at http://www.mozilla.com/firefox/ |
Related URL |
CVE-2019-11708 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|