Lucene search

K
mozillaMozilla FoundationMFSA2015-12
HistoryFeb 24, 2015 - 12:00 a.m.

Invoking Mozilla updater will load locally stored DLL files — Mozilla

2015-02-2400:00:00
Mozilla Foundation
www.mozilla.org
26

CVSS2

6.9

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.001

Percentile

28.6%

Security researcher Holger Fuhrmannek reported that when the Mozilla updater is run directly, the updater will load binary DLL format files from the local working directory or from the Windows temporary directories. This occurs when it is run without the Mozilla Maintenance Service on Windows systems. This allowed for possibly malicious DLL files to execute with elevated privileges if a user agrees when a User Account Control (UAC) prompt from Windows is displayed.

Affected configurations

Vulners
Node
mozillafirefoxRange<36
OR
mozillafirefox_esrRange<31.5
OR
mozillaseamonkeyRange<2.33
OR
mozillathunderbirdRange<31.5

CVSS2

6.9

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.001

Percentile

28.6%