A local attacker can trick the Mozilla Maintenance Service into applying an unsigned update file by pointing the service at an update file on a malicious SMB server. The update file can be replaced after the signature check, before the use, because the write-lock requested by the service does not work on a SMB server.
*Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.* This vulnerability affects Firefox < 112, Firefox ESR < 102.10, and Thunderbird < 102.10.
                
            References
                    | Link | Resource | 
|---|---|
| https://bugzilla.mozilla.org/show_bug.cgi?id=1806394 | Permissions Required | 
| https://www.mozilla.org/security/advisories/mfsa2023-13/ | Vendor Advisory | 
| https://www.mozilla.org/security/advisories/mfsa2023-14/ | Vendor Advisory | 
| https://www.mozilla.org/security/advisories/mfsa2023-15/ | Vendor Advisory | 
| https://bugzilla.mozilla.org/show_bug.cgi?id=1806394 | Permissions Required | 
| https://www.mozilla.org/security/advisories/mfsa2023-13/ | Vendor Advisory | 
| https://www.mozilla.org/security/advisories/mfsa2023-14/ | Vendor Advisory | 
| https://www.mozilla.org/security/advisories/mfsa2023-15/ | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
            
            
 
  | 
    
History
                    21 Nov 2024, 07:57
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://bugzilla.mozilla.org/show_bug.cgi?id=1806394 - Permissions Required | |
| References | () https://www.mozilla.org/security/advisories/mfsa2023-13/ - Vendor Advisory | |
| References | () https://www.mozilla.org/security/advisories/mfsa2023-14/ - Vendor Advisory | |
| References | () https://www.mozilla.org/security/advisories/mfsa2023-15/ - Vendor Advisory | 
27 Jun 2023, 08:27
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*  | 
|
| CWE | NVD-CWE-noinfo | |
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : unknown
         v3 : 5.5  | 
| References | (MISC) https://www.mozilla.org/security/advisories/mfsa2023-14/ - Vendor Advisory | |
| References | (MISC) https://bugzilla.mozilla.org/show_bug.cgi?id=1806394 - Permissions Required | |
| References | (MISC) https://www.mozilla.org/security/advisories/mfsa2023-13/ - Vendor Advisory | |
| References | (MISC) https://www.mozilla.org/security/advisories/mfsa2023-15/ - Vendor Advisory | 
19 Jun 2023, 10:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2023-06-19 10:15
Updated : 2024-12-11 16:15
NVD link : CVE-2023-29532
Mitre link : CVE-2023-29532
CVE.ORG link : CVE-2023-29532
JSON object : View
Products Affected
                mozilla
- firefox_esr
 - thunderbird
 - firefox
 
microsoft
- windows
 
CWE
                