Firefox < Apple QuickTime Plug-In .qtl File qtnext Field Cross-context Scripting

This script is Copyright (C) 2007-2017 Tenable Network Security, Inc.

Synopsis :

The remote Windows host contains a web browser that may allow
arbitrary code execution.

Description :

The installed version of Firefox may allow a remote attacker to run
script commands subject to the user's privileges via 'qtnext'
attributes in QuickTime Media-Link files.

Note that this issue can be exploited even if support for JavaScript
in the browser has been disabled.

See also :

Solution :

Upgrade to Firefox or later.

Risk factor :

High / CVSS Base Score : 9.3

Family: Windows

Nessus Plugin ID: 26068 ()

Bugtraq ID:

CVE ID: CVE-2006-4965

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now