First published: Tue Jul 28 2020(Updated: )
Firefox could be made to load attacker-supplied DLL files from the installation directory. This required an attacker that is already capable of placing files in the installation directory. Note: This issue only affected Windows operating systems. Other operating systems are unaffected.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox ESR | <78.1 | 78.1 |
<79 | 79 | |
<78.1 | 78.1 | |
Mozilla Firefox | <79.0 | |
Mozilla Firefox ESR | <78.1 | |
Mozilla Thunderbird | <78.1 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID is CVE-2020-15657.
Mozilla Firefox ESR 78.1, Mozilla Firefox 79, and Mozilla Thunderbird 78.1 are affected by this vulnerability.
The severity of CVE-2020-15657 is low.
The attacker needs to be capable of placing files in the installation directory to exploit this vulnerability.
No, this vulnerability only affects Windows operating systems.