CVE-2017-5427
Published: 7 March 2017
A non-existent chrome.manifest file will attempt to be loaded during startup from the primary installation directory. If a malicious user with local access puts chrome.manifest and other referenced files in this directory, they will be loaded and activated during startup. This could result in malicious software being added without consent or modification of referenced installed files. This vulnerability affects Firefox < 52.
Priority
Status
Package | Release | Status |
---|---|---|
firefox Launchpad, Ubuntu, Debian |
precise |
Released
(52.0+build2-0ubuntu0.12.04.1)
|
trusty |
Released
(52.0+build2-0ubuntu0.14.04.1)
|
|
upstream |
Released
(52.0)
|
|
xenial |
Released
(52.0+build2-0ubuntu0.16.04.1)
|
|
yakkety |
Released
(52.0+build2-0ubuntu0.16.10.1)
|
|
zesty |
Released
(52.0.1+build2-0ubuntu1)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.5 |
Attack vector | Local |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | High |
Availability impact | None |
Vector | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |