Check Point Reference: | CPAI-2011-478 |
Date Published: | 1 Nov 2011 |
Severity: | High |
Last Updated: | Thursday 14 January, 2016 |
Source: | |
Industry Reference: | CVE-2011-0073 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | A use-after-free vulnerability has been reported in Mozilla Firefox. The vulnerability is due to an error while handling user-defined functions in JavaScript (JS) files. A remote attacker may exploit this vulnerability by enticing users to open a specially crafted web-page using an affected version of Firefox. Successful exploitation would allow an attacker to execute arbitrary code in the user's security context. |
This protection will detect and block attempts to open a malicious web-page.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Web Client Enforcement Violation.
Attack Information: Mozilla Firefox nsTreeRange use after free