A mechanism to bypass file system access protections in the sandbox using the file system request constructor through an IPC message. This allows for read and write access to the local file system. This vulnerability affects Firefox ESR < 52.1 and Firefox < 53.
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Enterprise_linux | Redhat | 7.0 (including) | 7.0 (including) |
Enterprise_linux_desktop | Redhat | 7.0 (including) | 7.0 (including) |
Enterprise_linux_server | Redhat | 7.0 (including) | 7.0 (including) |
Enterprise_linux_server_aus | Redhat | 7.3 (including) | 7.3 (including) |
Enterprise_linux_server_aus | Redhat | 7.4 (including) | 7.4 (including) |
Enterprise_linux_server_eus | Redhat | 7.3 (including) | 7.3 (including) |
Enterprise_linux_server_eus | Redhat | 7.4 (including) | 7.4 (including) |
Enterprise_linux_server_eus | Redhat | 7.5 (including) | 7.5 (including) |
Enterprise_linux_workstation | Redhat | 7.0 (including) | 7.0 (including) |
Red Hat Enterprise Linux 7 | RedHat | firefox-0:52.1.0-2.el7_3 | * |
Firefox | Ubuntu | devel | * |
Firefox | Ubuntu | precise | * |
Firefox | Ubuntu | trusty | * |
Firefox | Ubuntu | upstream | * |
Firefox | Ubuntu | xenial | * |
Firefox | Ubuntu | yakkety | * |
Firefox | Ubuntu | zesty | * |
Thunderbird | Ubuntu | precise | * |