Firefox < 2.0.0.7 Apple QuickTime Plug-In .qtl File qtnext Field Cross-context Scripting

This script is Copyright (C) 2007-2017 Tenable Network Security, Inc.


Synopsis :

The remote Windows host contains a web browser that may allow
arbitrary code execution.

Description :

The installed version of Firefox may allow a remote attacker to run
script commands subject to the user's privileges via 'qtnext'
attributes in QuickTime Media-Link files.

Note that this issue can be exploited even if support for JavaScript
in the browser has been disabled.

See also :

https://www.mozilla.org/en-US/security/advisories/mfsa2007-28/

Solution :

Upgrade to Firefox 2.0.0.7 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)

Family: Windows

Nessus Plugin ID: 26068 ()

Bugtraq ID:

CVE ID: CVE-2006-4965

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now