First published: Tue Jun 13 2017(Updated: )
The Firefox installer on Windows can be made to load malicious DLL files stored in the same directory as the installer when it is run. This allows privileged execution if the installer is run with elevated privileges. Note: This attack only affects Windows operating systems. Other operating systems are unaffected.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Thunderbird | <52.2 | 52.2 |
Firefox | <54.0 | |
Firefox ESR | <52.2.0 | |
Thunderbird | <52.2.0 | |
Microsoft Windows | ||
Firefox | <54 | 54 |
Firefox ESR | <52.2 | 52.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2017-7755 is considered a high severity vulnerability due to its potential for privilege escalation in Windows environments.
To mitigate CVE-2017-7755, upgrade to Firefox versions above 54, Firefox ESR versions above 52.2, or Thunderbird versions above 52.2.
CVE-2017-7755 specifically affects the Windows operating system when running vulnerable versions of Mozilla applications.
CVE-2017-7755 impacts Mozilla Firefox, Firefox ESR, and Thunderbird versions up to specified thresholds.
CVE-2017-7755 requires local execution of a compromised installer, so it is not a remote attack vector.