The Firefox installer on Windows can be made to load malicious DLL files stored in the same directory as the installer when it is run. This allows privileged execution if the installer is run with elevated privileges. Note: This attack only affects Windows operating systems. Other operating systems are unaffected. This vulnerability affects Firefox < 54, Firefox ESR < 52.2, and Thunderbird < 52.2.
References
Link | Resource |
---|---|
https://www.mozilla.org/security/advisories/mfsa2017-17/ | Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2017-16/ | Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2017-15/ | Vendor Advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1361326 | Issue Tracking Vendor Advisory |
http://www.securitytracker.com/id/1038689 | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/99057 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2018-06-11 14:29
Updated : 2018-08-08 07:47
NVD link : CVE-2017-7755
Mitre link : CVE-2017-7755
JSON object : View
CWE
CWE-426
Untrusted Search Path
Products Affected
mozilla
- firefox
- firefox_esr
- thunderbird
microsoft
- windows