| VID |
28946 |
| Severity |
40 |
| Port |
139,445 |
| Protocol |
TCP |
| Class |
SMB |
| Detailed Description |
The version of Firefox installed on the remote Windows host is prior to 117.0.1. It is, therefore, affected by a vulnerability as referenced in the mfsa2023-40 advisory.
- Opening a malicious WebP image could lead to a heap buffer overflow in the content process. We are aware of this issue being exploited in other products in the wild. (CVE-2023-4863)
* References: https://www.mozilla.org/en-US/security/advisories/mfsa2023-40/ https://support.mozilla.org/ko/kb/update-firefox-latest-release
* Platforms Affected: Mozilla Foundation, Firefox versions prior to 117.0.1 Any operating system Any version |
| Recommendation |
Upgrade to the latest version of Firefox (117.0.1 or later), available from the Mozilla Web site at http://www.mozilla.com/firefox/ |
| Related URL |
CVE-2023-4863 (CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|