When installing an add-on, Firefox verified the signature before prompting the user; but while the user was confirming the prompt, the underlying add-on file could have been modified and Firefox would not have noticed. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
The product checks the state of a resource before using that resource, but the resource's state can change between the check and the use in a way that invalidates the results of the check. This can cause the product to perform invalid actions when the resource is in an unexpected state.
Link | Tags |
---|---|
https://www.mozilla.org/security/advisories/mfsa2022-12/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2022-10/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2022-11/ | vendor advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1752979 | issue tracking exploit vendor advisory |