Описание
Add-on updates failed to verify that the add-on ID inside the signed package matched the ID of the add-on being updated. An attacker who could perform a man-in-the-middle attack on the user's connection to the update server and defeat the certificate pinning protection could provide a malicious signed add-on instead of a valid update. This vulnerability affects Firefox ESR < 45.5 and Firefox < 50.
Релиз | Статус | Примечание |
---|---|---|
devel | released | 50.0.2+build1-0ubuntu1 |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [50.0+build2-0ubuntu0.14.04.2]] |
precise | released | 50.0+build2-0ubuntu0.12.04.2 |
trusty | released | 50.0+build2-0ubuntu0.14.04.2 |
trusty/esm | DNE | trusty was released [50.0+build2-0ubuntu0.14.04.2] |
upstream | released | 50.0 |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | released | 50.0+build2-0ubuntu0.16.04.2 |
yakkety | released | 50.0+build2-0ubuntu0.16.10.2 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected] |
precise | not-affected | |
trusty | not-affected | |
trusty/esm | DNE | trusty was not-affected |
upstream | not-affected | |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | not-affected | |
yakkety | not-affected |
Показывать по
4.3 Medium
CVSS2
5.9 Medium
CVSS3
Связанные уязвимости
Add-on updates failed to verify that the add-on ID inside the signed package matched the ID of the add-on being updated. An attacker who could perform a man-in-the-middle attack on the user's connection to the update server and defeat the certificate pinning protection could provide a malicious signed add-on instead of a valid update. This vulnerability affects Firefox ESR < 45.5 and Firefox < 50.
Add-on updates failed to verify that the add-on ID inside the signed package matched the ID of the add-on being updated. An attacker who could perform a man-in-the-middle attack on the user's connection to the update server and defeat the certificate pinning protection could provide a malicious signed add-on instead of a valid update. This vulnerability affects Firefox ESR < 45.5 and Firefox < 50.
Add-on updates failed to verify that the add-on ID inside the signed p ...
Add-on updates failed to verify that the add-on ID inside the signed package matched the ID of the add-on being updated. An attacker who could perform a man-in-the-middle attack on the user's connection to the update server and defeat the certificate pinning protection could provide a malicious signed add-on instead of a valid update. This vulnerability affects Firefox ESR < 45.5 and Firefox < 50.
4.3 Medium
CVSS2
5.9 Medium
CVSS3