MFSA 2013-74: Firefox full and stub installer DLL hijackingID: oval:org.secpod.oval:def:15023 | Date: (C)2013-09-01 (M)2024-03-27 |
Class: PATCH | Family: windows |
Security researcher Robert Kugler reported in 2012 that when a specifically named DLL file on a Windows computer is placed in the default downloads directory with the Firefox installer, the Firefox installer will load this DLL file when it is launched. Mozilla developers Brian Bondy and Robert Strong then discovered that the stub installer was vulnerable to this same issue with a number of DLL files and there were additionally vulnerable named DLL files with the full installer. In circumstances where an installer is run by an administrator privileged account, this allows for a downloaded DLL file to be run with those administrator privileges.
Platform: |
Microsoft Windows Server 2022 |
Microsoft Windows 11 |
Microsoft Windows Server 2019 |
Microsoft Windows Server 2016 |
Microsoft Windows 2000 |
Microsoft Windows XP |
Microsoft Windows Server 2003 |
Microsoft Windows Vista |
Microsoft Windows Server 2008 |
Microsoft Windows 7 |
Microsoft Windows Server 2008 R2 |
Microsoft Windows 8 |
Microsoft Windows 8.1 |
Microsoft Windows Server 2012 |
Microsoft Windows Server 2012 R2 |
Microsoft Windows 10 |
Product: |
Mozilla SeaMonkey |
Mozilla Firefox |