First published: Tue Nov 15 2016(Updated: )
When the Mozilla Updater is run, if the Updater's log file in the working directory points to a hardlink, data can be appended to an arbitrary local file. This vulnerability requires local system access. Note: this issue only affects Windows operating systems.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <50 | 50 |
<50 | 50 | |
<45.5 | 45.5 | |
Mozilla Firefox | <50.0 | |
Mozilla Firefox ESR | <45.5.0 | |
Microsoft Windows | ||
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2016-5293 is a vulnerability that allows data to be appended to an arbitrary local file when the Mozilla Updater is run on Windows operating systems.
CVE-2016-5293 affects Mozilla Firefox versions up to and excluding 50.
CVE-2016-5293 affects Mozilla Firefox ESR versions up to and excluding 45.5.
Yes, local system access is required to exploit CVE-2016-5293.
You can find more information about CVE-2016-5293 at the following references:<br>- [Bugzilla - CVE-2016-5293](https://bugzilla.mozilla.org/show_bug.cgi?id=1246945)<br>- [Mozilla Security Advisory - MFSA2016-89](https://www.mozilla.org/en-US/security/advisories/mfsa2016-89/)<br>- [Mozilla Security Advisory - MFSA2016-90](https://www.mozilla.org/en-US/security/advisories/mfsa2016-90/)