Bug 2186100 (CVE-2023-29532) - CVE-2023-29532 Mozilla: Mozilla Maintenance Service Write-lock bypass
Summary: CVE-2023-29532 Mozilla: Mozilla Maintenance Service Write-lock bypass
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2023-29532
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 2183233
TreeView+ depends on / blocked
 
Reported: 2023-04-12 06:23 UTC by Dhananjay Arunesh
Modified: 2023-04-28 09:42 UTC (History)
5 users (show)

Fixed In Version: firefox 102.10, thunderbird 102.10
Doc Type: ---
Doc Text:
The Mozilla Foundation Security Advisory describes this flaw as: A local attacker can trick the Mozilla Maintenance Service into applying an unsigned update file by pointing the service at an update file on a malicious SMB server. The update file can be replaced after the signature check, before the use, because the write-lock requested by the service does not work on a SMB server. *Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.*
Clone Of:
Environment:
Last Closed: 2023-04-12 13:07:27 UTC
Embargoed:


Attachments (Terms of Use)

Description Dhananjay Arunesh 2023-04-12 06:23:23 UTC
A local attacker can trick the Mozilla Maintenance Service into applying an unsigned update file by pointing the service at an update file on a malicious SMB server. The update file can be replaced after the signature check, before the use, because the write-lock requested by the service does not work on a SMB server.

*Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.*

External Reference:
https://www.mozilla.org/en-US/security/advisories/mfsa2023-14/#CVE-2023-29532

Comment 1 Product Security DevOps Team 2023-04-12 13:07:25 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2023-29532


Note You need to log in before you can comment on or make changes to this bug.