First published: Tue Nov 14 2017(Updated: )
The "pingsender" executable used by the Firefox Health Report dynamically loads a system copy of libcurl, which an attacker could replace. This allows for privilege escalation as the replaced libcurl code will run with Firefox's privileges. Note: This attack requires an attacker have local system access and only affects OS X and Linux. Windows systems are not affected.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <57 | 57 |
Mozilla Firefox | <=56.0.2 | |
Apple Mac OS X | ||
Linux Linux kernel | ||
<57 | 57 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2017-7836 is a vulnerability that allows an attacker to replace the system copy of libcurl used by the Firefox Health Report, leading to privilege escalation.
Mozilla Firefox versions up to and including 57.0.2 are affected by CVE-2017-7836.
CVE-2017-7836 has a severity score of 7.8 (high).
To fix CVE-2017-7836, upgrade to Mozilla Firefox version 58 or later.
More information about CVE-2017-7836 can be found at the following references: [link1], [link2], [link3].