The Firefox installer on Windows can be made to load malicious DLL files stored in the same directory as the installer when it is run. This allows privileged execution if the installer is run with elevated privileges. Note: This attack only affects Windows operating systems. Other operating systems are unaffected. This vulnerability affects Firefox < 54, Firefox ESR < 52.2, and Thunderbird < 52.2.
The product searches for critical resources using an externally-supplied search path that can point to resources that are not under the product's direct control.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/99057 | third party advisory vdb entry |
https://www.mozilla.org/security/advisories/mfsa2017-15/ | vendor advisory |
http://www.securitytracker.com/id/1038689 | third party advisory vdb entry |
https://bugzilla.mozilla.org/show_bug.cgi?id=1361326 | vendor advisory issue tracking |
https://www.mozilla.org/security/advisories/mfsa2017-17/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2017-16/ | vendor advisory |