First published: Tue Nov 15 2016(Updated: )
The Mozilla Updater can be made to choose an arbitrary target working directory for output files resulting from the update process. This vulnerability requires local system access. Note: this issue only affects Windows operating systems.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Thunderbird | <45.5 | 45.5 |
<50 | 50 | |
<45.5 | 45.5 | |
Mozilla Firefox | <50.0 | |
Mozilla Firefox ESR | <45.5.0 | |
Mozilla Thunderbird | <45.5.0 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2016-5294 is a vulnerability in the Mozilla Updater that allows an attacker to choose an arbitrary target working directory for output files during the update process.
This vulnerability only affects Windows operating systems.
Mozilla Thunderbird up to version 45.5, Mozilla Firefox up to version 50, and Mozilla Firefox ESR up to version 45.5 are affected by this vulnerability.
CVE-2016-5294 has a severity rating of 7 out of 10 (high severity).
To fix CVE-2016-5294, users should update to the latest versions of Mozilla Thunderbird, Mozilla Firefox, or Mozilla Firefox ESR, which have the necessary patches to address this vulnerability.