First published: Tue Apr 11 2023(Updated: )
A local attacker can trick the Mozilla Maintenance Service into applying an unsigned update file by pointing the service at an update file on a malicious SMB server. The update file can be replaced after the signature check, before the use, because the write-lock requested by the service does not work on a SMB server. *Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.* This vulnerability affects Firefox < 112, Firefox ESR < 102.10, and Thunderbird < 102.10.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox ESR | <102.10 | 102.10 |
Mozilla Firefox | <112 | 112 |
All of | ||
Mozilla Firefox | =112 | |
Google Android | ||
All of | ||
Mozilla Focus | =112 | |
Google Android | ||
<102.10 | 102.10 | |
<102.10 | 102.10 | |
Mozilla Firefox | <112.0 | |
Mozilla Firefox ESR | <102.10 | |
Mozilla Thunderbird | <102.10 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-29532 refers to a vulnerability where a local attacker can trick the Mozilla Maintenance Service into applying an unsigned update file.
CVE-2023-29532 works by the attacker pointing the Mozilla Maintenance Service at an update file on a malicious SMB server and replacing the update file after the signature check.
Firefox ESR versions up to 102.10, Thunderbird versions up to 102.10, Firefox versions up to 112, and Firefox for Android versions up to 112 are affected by CVE-2023-29532.
CVE-2023-29532 has a severity value of 7, which is classified as high.
To mitigate CVE-2023-29532, it is recommended to update to the fixed version of the affected software.