Mozilla Firefox Maintenance Service Local Privilege Escalation

2013.07.09
Credit: VUPEN
Risk: Medium
Local: Yes
Remote: No
CVE: N/A
CWE: CWE-264

VUPEN Security Research - Mozilla Firefox Maintenance Service Local Privilege Escalation Vulnerabilities Website : http://www.vupen.com Twitter : http://twitter.com/vupen I. BACKGROUND --------------------- Mozilla Firefox is a free and open source web browser coordinated by Mozilla Corporation and Mozilla Foundation. As of October 2012, Firefox has approximately 20% to 24% of worldwide usage share of web browsers, making it the third most used web browser. (Wikipedia) II. DESCRIPTION --------------------- VUPEN Vulnerability Research Team discovered high risk vulnerabilities in Mozilla Firefox. The vulnerabilities are caused by errors in the Mozilla Maintenance Service on Windows when interacting with local software, which could allow local unprivileged users to execute arbitrary code with SYSTEM privileges. It is of course possible to combine these vulnerabilities with a remote Firefox memory corruption to achieve a remote SYSTEM code execution. III. AFFECTED PRODUCTS --------------------------- Mozilla Firefox versions prior to 21.0 Mozilla Firefox ESR versions prior to 17.0.6 Mozilla Thunderbird versions prior to 17.0.6 Mozilla Thunderbird ESR versions prior to 17.0.6 IV. Binary Analysis & Exploits/PoCs --------------------------------------- In-depth technical analysis of the vulnerability and a private exploit will be available through the VUPEN BAE (Binary Analysis & Exploits) portal: http://www.vupen.com/english/services/ba-index.php VUPEN Binary Analysis & Exploits Service provides private exploits and in-depth technical analysis of the most significant public vulnerabilities based on disassembly, reverse engineering, protocol analysis, and code audit. The service allows governments and major corporations to evaluate risks, and protect infrastructures and assets against new threats. The service also allows security vendors (IPS, IDS, AntiVirus) to supplement their internal research efforts and quickly develop both vulnerability-based and exploit-based signatures to proactively protect their customers from attacks and emerging threats. V. VUPEN Threat Protection Program ----------------------------------- Governments and major corporations which are members of the VUPEN Threat Protection Program (TPP) have been proactively alerted about the vulnerability when it was discovered by VUPEN in advance of its public disclosure, and have received a detailed attack detection guidance to protect national and critical infrastructures against potential 0-day attacks exploiting this vulnerability: http://www.vupen.com/english/services/tpp-index.php VI. SOLUTION ---------------- Upgrade to Mozilla Firefox 21.0 or ESR 17.0.6. Upgrade to Mozilla Thunderbird or Thunderbird ESR 17.0.6 VII. CREDIT -------------- This vulnerability was discovered by Richard L. of VUPEN Security VIII. ABOUT VUPEN Security --------------------------- VUPEN is the leading provider of defensive and offensive cybersecurity intelligence and advanced vulnerability research. VUPEN solutions enable corporations and governments to manage risks, and protect critical networks and infrastructures against known and unknown vulnerabilities. VUPEN solutions include: * VUPEN Binary Analysis & Exploits Service (BAE) : http://www.vupen.com/english/services/ba-index.php * VUPEN Threat Protection Program (TPP) : http://www.vupen.com/english/services/tpp-index.php IX. REFERENCES ---------------------- http://www.mozilla.org/security/announce/2013/mfsa2013-44.html http://www.vupen.com/english/research.php X. DISCLOSURE TIMELINE ----------------------------- ****-**-** - Vulnerability Discovered by VUPEN 2013-05-14 - Vulnerability Fixed by Mozilla 2013-07-08 - Public disclosure

References:

http://twitter.com/vupen
http://www.mozilla.org/security/announce/2013/mfsa2013-44.html
http://www.vupen.com/english/research.php


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top