NOTE: Firefox Must Be Installed As The Default Browser
Local Code Execution
BeyondTrust Prevention and Detection:
BeyondTrust's Blink® Personal Edition protects from this vulnerability.
BeyondTrust's Blink® Professional Edition protects from this vulnerability.
BeyondTrust's Retina® Network Security Scanner scans devices to detect for this vulnerability.
Firefox has close the exploit vector by disabling script execution from the command line. To mitigate the impact of this vulnerability, users are urged to upgrade to Firefox version 184.108.40.206 or later.
Other than rolling out the latest version of Firefox, the best form of mitigation is to disable the QuickTime plugins for each affected Internet Browser Vector: IE7, Firefox, and Opera. This can be accomplished by prepending the QuickTime plugin binaries (npqt*.dll or nppqt*.dll) in the Plugins folders for Opera/Firefox/Quicktime to have an 'X' at the beggining of their filename. To mitigate the vulnerability from using Internet Explorer as an attack vector, block the QuickTime CLSIDs (02BF25D5-8C17-4B23-BC80-D3488ABDDC6B;4063BE15-3B08-470D-A0D5-B37161CFFD69) following the directions of KB240797.
NOTE: If a user manually opened a malicious QuickTime file, they could still be exploited. The listed mitigation ensures that users must manually open a malicious file, rather than the file auto-opening when browsed to with a Browser.
Links:Mozilla Foundation Security Advisory 2007-28
Original Vulnerability Disclosure
Second Disclosure of Same Vulnerability Vulnerability
Third Disclosure of Same Vulnerability Vulnerability