Lucene search

K
ubuntucveUbuntu.comUB:CVE-2022-26387
HistoryMar 09, 2022 - 12:00 a.m.

CVE-2022-26387

2022-03-0900:00:00
ubuntu.com
ubuntu.com
19
firefox
add-on
signature
verification
bypass
thunderbird
vulnerability

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

61.8%

When installing an add-on, Firefox verified the signature before prompting
the user; but while the user was confirming the prompt, the underlying
add-on file could have been modified and Firefox would not have noticed.
This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and
Thunderbird < 91.7.

Notes

Author Note
tyhicks mozjs contains a copy of the SpiderMonkey JavaScript engine
OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchfirefox< 98.0+build3-0ubuntu0.18.04.2UNKNOWN
ubuntu20.04noarchfirefox< 98.0+build3-0ubuntu0.20.04.2UNKNOWN
ubuntu21.10noarchfirefox< 98.0+build3-0ubuntu0.21.10.2UNKNOWN
ubuntu22.04noarchfirefox< 1:1snap1-0ubuntu1UNKNOWN
ubuntu22.10noarchfirefox< 1:1snap1-0ubuntu1UNKNOWN
ubuntu23.04noarchfirefox< 1:1snap1-0ubuntu1UNKNOWN
ubuntu23.10noarchfirefox< 1:1snap1-0ubuntu1UNKNOWN
ubuntu24.04noarchfirefox< 1:1snap1-0ubuntu1UNKNOWN
ubuntu18.04noarchmozjs38< anyUNKNOWN
ubuntu18.04noarchmozjs52< anyUNKNOWN
Rows per page:
1-10 of 211

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

61.8%