Endpoint Vulnerability

Invoking Mozilla updater will load locally stored DLL files

Description

Security researcher Holger Fuhrmannek reported that when the Mozilla updater is run directly, the updater will load binary DLL format files from the local working directory or from the Windows temporary directories. This occurs when it is run without the Mozilla Maintenance Service on Windows systems. This allowed for possibly malicious DLL files to execute with elevated privileges if a user agrees when a User Account Control (UAC) prompt from Windows is displayed.

Affected Products

Firefox,Firefox ESR

References

CVE-2015-0833,