Mozilla Firefox up to 40.0.2 Add-on Installation privilege escalation : 8/28/2015 10:58:01 AM
This eBook shows you how common web marketing tactics map to their mobile counterparts, including a "this = that" chart of web to app equivalents. From our sponsors |
| Vulnerability Advisories |
| Vulnerabilities of scip VulDB |
Mozilla Firefox up to 40.0.2 Add-on Installation privilege escalation
8/26/2015 7:00:00 PM
General
scipID: 77469
Affected: Mozilla Firefox up to 40.0.2
Published: 08/27/2015 (Bas Venis)
Risk: critical
Created: 08/28/2015
Entry: 75% complete
Summary
A vulnerability was found in Mozilla Firefox up to 40.0.2. It has been classified as critical. This affects an unknown function of the component Add-on Installation. The manipulation with an unknown input leads to a privilege escalation vulnerability. This is going to have an impact on confidentiality, integrity, and availability.
The weakness was shared 08/27/2015 by Bas Venis as MFSA 2015-95 as confirmed security advisory (Website). The advisory is shared for download at mozilla.org. This vulnerability is uniquely identified as CVE-2015-4498. It is possible to initiate the attack remotely. No form of authentication is needed for exploitation. Neither technical details nor an exploit are publicly available.
Upgrading to version 40.0.3 eliminates this vulnerability. A possible mitigation has been published immediately after the disclosure of the vulnerability. The vulnerability is also documented in the databases at X-Force (105898) and SecurityTracker (ID 1033396).CVSS
Base Score: 6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P) [?]
Temp Score: 5.0 (CVSS2#E:U/RL:OF/RC:C) [?]
CPE
Exploiting
Class: Privilege escalation
Local: No
Remote: Yes
Availability: No
Status: Unproven
Countermeasures
Recommended: Upgrade
Status: Official fix
Reaction Time: 0 days since reported
0-Day Time: 0 days since found
Exposure Time: 0 days since known
Upgrade: Firefox 40.0.3
Timeline
08/27/2015 | Advisory disclosed
08/27/2015 | Countermeasure disclosed
08/27/2015 | SecurityTracker entry created
08/28/2015 | VulDB entry created
08/28/2015 | VulDB entry updated
Sources
Advisory: MFSA 2015-95
Researcher: Bas Venis
Status: Confirmed
CVE: CVE-2015-4498 (mitre.org) (nvd.nist.org) (cvedetails.com)
X-Force: 105898 – Mozilla Firefox add-ons security bypass
SecurityTracker: 1033396 – Mozilla Firefox Lets Remote Users Bypass the Add-on Installation Prompt on the Target System
You are receiving this email because you subscribed to this feed at feedmyinbox.com
If you no longer wish to receive these emails, you can unsubscribe from this feed, or manage all your subscriptions