A local attacker can trick the Mozilla Maintenance Service into applying an unsigned update file by pointing the service at an update file on a malicious SMB server. The update file can be replaced after the signature check, before the use, because the write-lock requested by the service does not work on a SMB server.
Note: This attack requires local system access and only affects Windows. Other operating systems are not affected. This vulnerability affects Firefox < 112, Firefox ESR < 102.10, and Thunderbird < 102.10.
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-29532.json"
[
{
"events": [
{
"introduced": "0"
},
{
"fixed": "112.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "102.10"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "102.10"
}
]
}
]