Lucene search

K
mozillaMozilla FoundationMFSA2012-98
HistoryNov 20, 2012 - 12:00 a.m.

Firefox installer DLL hijacking — Mozilla

2012-11-2000:00:00
Mozilla Foundation
www.mozilla.org
36

6.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

14.2%

Security researcher Robert Kugler reported that when a specifically named DLL file on a Windows computer is placed in the default downloads directory with the Firefox installer, the Firefox installer will load this DLL when it is launched. In circumstances where the installer is run by an administrator privileged account, this allows for the downloaded DLL file to be run with administrator privileges. This can lead to arbitrary code execution from a privileged account.

Affected configurations

Vulners
Node
mozillafirefoxRange<17
OR
mozillafirefoxRange<18
OR
mozillafirefox_esrRange<10.0.11
OR
mozillafirefox_esrRange<10.0.12
OR
mozillafirefox_esrRange<17.0.1

6.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

14.2%