Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-0833

Опубликовано: 25 фев. 2015
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.9

Описание

Multiple untrusted search path vulnerabilities in updater.exe in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 on Windows, when the Maintenance Service is not used, allow local users to gain privileges via a Trojan horse DLL in (1) the current working directory or (2) a temporary directory, as demonstrated by bcrypt.dll.

РелизСтатусПримечание
devel

not-affected

windows only
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [windows only]]
lucid

ignored

end of life
precise

not-affected

windows only
trusty

not-affected

windows only
trusty/esm

DNE

trusty was not-affected [windows only]
upstream

released

36
utopic

not-affected

windows only

Показывать по

РелизСтатусПримечание
devel

not-affected

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected]
lucid

ignored

end of life
precise

not-affected

trusty

not-affected

trusty/esm

DNE

trusty was not-affected
upstream

not-affected

utopic

not-affected

Показывать по

EPSS

Процентиль: 16%
0.00052
Низкий

6.9 Medium

CVSS2

Связанные уязвимости

nvd
почти 11 лет назад

Multiple untrusted search path vulnerabilities in updater.exe in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 on Windows, when the Maintenance Service is not used, allow local users to gain privileges via a Trojan horse DLL in (1) the current working directory or (2) a temporary directory, as demonstrated by bcrypt.dll.

debian
почти 11 лет назад

Multiple untrusted search path vulnerabilities in updater.exe in Mozil ...

github
больше 3 лет назад

Multiple untrusted search path vulnerabilities in updater.exe in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 on Windows, when the Maintenance Service is not used, allow local users to gain privileges via a Trojan horse DLL in (1) the current working directory or (2) a temporary directory, as demonstrated by bcrypt.dll.

EPSS

Процентиль: 16%
0.00052
Низкий

6.9 Medium

CVSS2