Lucene search

K
mozillaMozilla FoundationMFSA2015-57
HistoryMay 12, 2015 - 12:00 a.m.

Privilege escalation through IPC channel messages — Mozilla

2015-05-1200:00:00
Mozilla Foundation
www.mozilla.org
37

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.011 Low

EPSS

Percentile

84.7%

Mozilla Developer Jed Davis and Mozilla security engineer Christoph Diehl reported that Mozilla had inherited a Inter-process Communication (IPC) vulnerability when IPC was introduced into Mozilla products through third-party code. This could allow for privilege escalation through IPC channels due to lack of message validation in the listener process.

Affected configurations

Vulners
Node
mozillafirefoxRange<38
OR
mozillafirefox_esrRange<31.7
OR
mozillaseamonkeyRange<2.35
OR
mozillathunderbirdRange<31.7
OR
mozillathunderbirdRange<38.0.1

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.011 Low

EPSS

Percentile

84.7%