VID |
28946 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The version of Firefox installed on the remote Windows host is prior to 117.0.1. It is, therefore, affected by a vulnerability as referenced in the mfsa2023-40 advisory.
- Opening a malicious WebP image could lead to a heap buffer overflow in the content process. We are aware of this issue being exploited in other products in the wild. (CVE-2023-4863)
* References: https://www.mozilla.org/en-US/security/advisories/mfsa2023-40/ https://support.mozilla.org/ko/kb/update-firefox-latest-release
* Platforms Affected: Mozilla Foundation, Firefox versions prior to 117.0.1 Any operating system Any version |
Recommendation |
Upgrade to the latest version of Firefox (117.0.1 or later), available from the Mozilla Web site at http://www.mozilla.com/firefox/ |
Related URL |
CVE-2023-4863 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|