Korean
<< Back
VID 28950
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description The version of Firefox installed on the remote Windows host is prior to 121.0. It is, therefore, affected by multiple vulnerabilities as referenced in the mfsa2023-56 advisory.

- The WebGL <code>DrawElementsInstanced</code> method was susceptible to a heap buffer overflow when used onsystems with the Mesa VM driver. This issue could allow an attacker to perform remote code execution andsandbox escape. (CVE-2023-6856)
- Multiple NSS NIST curves were susceptible to a side-channel attack known as Minerva. This attack couldpotentially allow an attacker to recover the private key. (CVE-2023-6135)
- <code>EncryptingOutputStream</code> was susceptible to exposing uninitialized data. This issue could onlybe abused in order to write data to a local disk which may have implications for private browsing mode. (CVE-2023-6865)
- When resolving a symlink, a race may occur where the buffer passed to <code>readlink</code> may actuallybe smaller than necessary. This bug only affects Firefox on Unix-based operating systems (Android, Linux,MacOS). Windows is unaffected. (CVE-2023-6857)
- Firefox was susceptible to a heap buffer overflow in <code>nsTextFragment</code> due to insufficient OOMhandling. (CVE-2023-6858)
- A use-after-free condition affected TLS socket creation when under memory pressure. (CVE-2023-6859)
- TypedArrays can be fallible and lacked proper exception handling. This could lead to abuse in other APIswhich expect TypedArrays to always succeed. (CVE-2023-6866)
- The <code>VideoBridge</code> allowed any content process to use textures produced by remote decoders. Thiscould be abused to escape the sandbox. (CVE-2023-6860)
- The timing of a button click causing a popup to disappear was approximately the same length as the anti-clickjacking delay on permission prompts. It was possible to use this fact to surprise users by luringthem to click where the permission grant button would be about to appear. (CVE-2023-6867)

* References:
https://www.mozilla.org/en-US/security/advisories/mfsa2023-56/

* Platforms Affected:
Mozilla Foundation, Firefox versions prior to 121.0
Any operating system Any version
Recommendation Upgrade to the latest version of Firefox (121.0 or later), available from the Mozilla Web site at http://www.mozilla.com/firefox/
Related URL CVE-2023-6856,CVE-2023-6135,CVE-2023-6865,CVE-2023-6857,CVE-2023-6858,CVE-2023-6859,CVE-2023-6866,CVE-2023-6860,CVE-2023-6867 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)