First published: Tue Sep 03 2019(Updated: )
The Firefox installer allows Firefox to be installed to a custom user writable location, leaving it unprotected from manipulation by unprivileged users or malware. If the Mozilla Maintenance Service is manipulated to update this unprotected location and the updated maintenance service in the unprotected location has been altered, the altered maintenance service can run with elevated privileges during the update process due to a lack of integrity checks. This allows for privilege escalation if the executable has been replaced locally. <br>*Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.*. This vulnerability affects Firefox < 69, Firefox ESR < 60.9, and Firefox ESR < 68.1.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox ESR | <68.1 | 68.1 |
Mozilla Firefox | <69.0 | |
Mozilla Firefox ESR | <60.9.0 | |
Mozilla Firefox ESR | >=68.0<68.1.0 | |
Microsoft Windows | ||
<60.9 | 60.9 | |
<68.1 | 68.1 | |
Mozilla Firefox | <69 | 69 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID is CVE-2019-11753.
The severity of CVE-2019-11753 is high.
CVE-2019-11753 affects Mozilla Firefox ESR versions 68.1 and 60.9, as well as Mozilla Firefox version up to 69.
CVE-2019-11753 allows the Firefox installer to be installed to a custom user writable location, leaving it unprotected from manipulation by unprivileged users or malware.
Yes, Mozilla has released updates to address the vulnerability. It is recommended to update to the latest version of Mozilla Firefox or Mozilla Firefox ESR.