Vulnerability Details : CVE-2014-1520
maintenservice_installer.exe in the Maintenance Service Installer in Mozilla Firefox before 29.0 and Firefox ESR 24.x before 24.5 on Windows allows local users to gain privileges by placing a Trojan horse DLL file into a temporary directory at an unspecified point in the update process.
Products affected by CVE-2014-1520
- cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-1520
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-1520
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.9
|
MEDIUM | AV:L/AC:M/Au:N/C:C/I:C/A:C |
3.4
|
10.0
|
NIST |
CWE ids for CVE-2014-1520
-
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-1520
-
http://www.securitytracker.com/id/1030163
Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Deny Service, and Conduct Cross-Site Scripting Attacks and Local Users Gain Elevated Privileges - SecurityTrackerThird Party Advisory;VDB Entry
-
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
Oracle Solaris Bulletin - April 2016Third Party Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132332.html
[SECURITY] Fedora 20 Update: thunderbird-24.5.0-1.fc20Third Party Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132437.html
[SECURITY] Fedora 19 Update: firefox-29.0-5.fc19Third Party Advisory
-
http://seclists.org/fulldisclosure/2021/Mar/14
Full Disclosure: Unholy CRAP: Moziila's executable installersMailing List;Third Party Advisory
-
https://security.gentoo.org/glsa/201504-01
Mozilla Products: Multiple vulnerabilities (GLSA 201504-01) — Gentoo securityThird Party Advisory
-
http://packetstormsecurity.com/files/161696/Mozilla-Arbitrary-Code-Execution-Privilege-Escalation.html
Mozilla Arbitrary Code Execution / Privilege Escalation ≈ Packet StormThird Party Advisory;VDB Entry
-
https://bugzilla.mozilla.org/show_bug.cgi?id=961676
961676 - (CVE-2014-1520) Unsafe temp directory usage in maintenservice_installer.exe lead to possible privilege escalationExploit;Issue Tracking;Patch;Vendor Advisory
-
http://www.mozilla.org/security/announce/2014/mfsa2014-35.html
Privilege escalation through Mozilla Maintenance Service Installer — MozillaVendor Advisory
Jump to