Add-on updates failed to verify that the add-on ID inside the signed package matched the ID of the add-on being updated. An attacker who could perform a man-in-the-middle attack on the users connection to the update server and defeat the certificate pinning protection could provide a malicious signed add-on instead of a valid update. This vulnerability affects Firefox ESR < 45.5 and Firefox < 50.
The product does not validate, or incorrectly validates, a certificate.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Firefox | Mozilla | * | 50.0 (excluding) |
Firefox_esr | Mozilla | * | 45.5.0 (excluding) |
Red Hat Enterprise Linux 5 | RedHat | firefox-0:45.5.0-1.el5_11 | * |
Red Hat Enterprise Linux 6 | RedHat | firefox-0:45.5.0-1.el6_8 | * |
Red Hat Enterprise Linux 7 | RedHat | firefox-0:45.5.0-1.el7_3 | * |
Firefox | Ubuntu | devel | * |
Firefox | Ubuntu | precise | * |
Firefox | Ubuntu | trusty | * |
Firefox | Ubuntu | upstream | * |
Firefox | Ubuntu | xenial | * |
Firefox | Ubuntu | yakkety | * |