CVE-2025-2817
Thunderbird's update mechanism allowed a medium-integrity user process to interfere with the SYSTEM-level updater by manipulating the file-locking behavior. By injecting code into the user-privileged process, an attacker could bypass intended access controls, allowing SYSTEM-level file operations on paths controlled by a non-privileged user and enabling privilege escalation. This vulnerability affects Firefox < 138, Firefox ESR < 128.10, Firefox ESR < 115.23, Thunderbird < 138, and Thunderbird < 128.10.
Vendor
Product
CWE
Yayın Tarihi
2025-04-29 14:15:32
Güncelleme
2025-11-03 20:18:09
Source Identifier
security@mozilla.org
KEV Date Added
-
Kategoriler
Referanslar
https://bugzilla.mozilla.org/show_bug.cgi?id=1917536
https://www.mozilla.org/security/advisories/mfsa2025-28/
https://www.mozilla.org/security/advisories/mfsa2025-29/
https://www.mozilla.org/security/advisories/mfsa2025-30/
https://www.mozilla.org/security/advisories/mfsa2025-31/
https://www.mozilla.org/security/advisories/mfsa2025-32/
https://lists.debian.org/debian-lts-announce/2025/05/msg00022.html