Lucene search

K
mozillaMozilla FoundationMFSA2015-100
HistorySep 22, 2015 - 12:00 a.m.

Arbitrary file manipulation by local user through Mozilla updater — Mozilla

2015-09-2200:00:00
Mozilla Foundation
www.mozilla.org
22

6.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:N/I:C/A:C

0.0004 Low

EPSS

Percentile

5.1%

Security researcher Holger Fuhrmannek reported that when the Mozilla updater is run, the updater can be manipulated to load the updated files from a working directory under user control in concert with junctions. When the updates are run by the Mozilla Maintenance Service on Windows, these malicious files can be run with elevated privileges and be used to replace arbitrary files on the system. This could allow for arbitrary code execution by a malicious user with local system access but does not allow for exploitation by web content.

Affected configurations

Vulners
Node
mozillafirefoxRange<41
OR
mozillafirefox_esrRange<38.3
OR
mozillathunderbirdRange<38.3
CPENameOperatorVersion
firefoxlt41
firefox esrlt38.3
thunderbirdlt38.3

6.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:N/I:C/A:C

0.0004 Low

EPSS

Percentile

5.1%