First published: Tue Nov 15 2016(Updated: )
Add-on updates failed to verify that the add-on ID inside the signed package matched the ID of the add-on being updated. An attacker who could perform a man-in-the-middle attack on the user's connection to the update server and defeat the certificate pinning protection could provide a malicious signed add-on instead of a valid update.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <50 | 50 |
<50 | 50 | |
<45.5 | 45.5 | |
Mozilla Firefox | <50.0 | |
Mozilla Firefox ESR | <45.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2016-9064 is a vulnerability that allowed an attacker to provide a malicious signed package during add-on updates in Mozilla Firefox.
Mozilla Firefox versions up to and including 50, and Mozilla Firefox ESR versions up to and including 45.5 are affected by CVE-2016-9064.
CVE-2016-9064 has a severity rating of 7 (high).
By performing a man-in-the-middle attack on the user's connection to the update server and defeating the certificate pinning protection, an attacker can provide a malicious signed package during add-on updates.
You can find more information about CVE-2016-9064 on the Mozilla Bugzilla page (https://bugzilla.mozilla.org/show_bug.cgi?id=1303418) and the Mozilla Security Advisories (https://www.mozilla.org/en-US/security/advisories/mfsa2016-89/ and https://www.mozilla.org/en-US/security/advisories/mfsa2016-90/).