Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-29542
HistoryJun 19, 2023 - 12:00 a.m.

CVE-2023-29542

2023-06-1900:00:00
ubuntu.com
ubuntu.com
5
cve-2023-29542
filename newline bypass
malicious code
firefox
thunderbird
windows
vulnerability
version affected

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

59.9%

A newline in a filename could have been used to bypass the file extension
security mechanisms that replace malicious file extensions such as .lnk
with .download. This could have led to accidental execution of malicious
code. This bug only affects Firefox and Thunderbird on Windows. Other
versions of Firefox and Thunderbird are unaffected.
This vulnerability
affects Firefox < 112, Firefox ESR < 102.10, and Thunderbird < 102.10.

Notes

Author Note
tyhicks mozjs contains a copy of the SpiderMonkey JavaScript engine
mdeslaur starting with Ubuntu 22.04, the firefox package is just a script that installs the Firefox snap
rodrigo-zaiden Windows issue only

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

59.9%