CVE Vulnerabilities

CVE-2023-29532

Published: Jun 19, 2023 | Modified: Dec 11, 2024
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
7.5 IMPORTANT
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Ubuntu
NEGLIGIBLE
root.io logo minimus.io logo echo.ai logo

A local attacker can trick the Mozilla Maintenance Service into applying an unsigned update file by pointing the service at an update file on a malicious SMB server. The update file can be replaced after the signature check, before the use, because the write-lock requested by the service does not work on a SMB server.

Note: This attack requires local system access and only affects Windows. Other operating systems are not affected. This vulnerability affects Firefox < 112, Firefox ESR < 102.10, and Thunderbird < 102.10.

Affected Software

NameVendorStart VersionEnd Version
FirefoxMozilla*112.0 (excluding)
Firefox_esrMozilla*102.10 (excluding)
ThunderbirdMozilla*102.10 (excluding)
FirefoxUbuntutrusty*
FirefoxUbuntuxenial*
Mozjs38Ubuntubionic*
Mozjs38Ubuntuesm-apps/bionic*
Mozjs38Ubuntuupstream*
Mozjs52Ubuntubionic*
Mozjs52Ubuntuesm-apps/focal*
Mozjs52Ubuntuesm-infra/bionic*
Mozjs52Ubuntufocal*
Mozjs52Ubuntuupstream*
Mozjs68Ubuntuesm-infra/focal*
Mozjs68Ubuntufocal*
Mozjs68Ubuntuupstream*
Mozjs78Ubuntuesm-apps/jammy*
Mozjs78Ubuntujammy*
Mozjs78Ubuntukinetic*
Mozjs78Ubuntulunar*
Mozjs78Ubuntuupstream*
Mozjs91Ubuntujammy*
Mozjs91Ubuntuupstream*
ThunderbirdUbuntutrusty*
ThunderbirdUbuntuxenial*

References