{"id":"UBUNTU-CVE-2023-29532","details":"A local attacker can trick the Mozilla Maintenance Service into applying an unsigned update file by pointing the service at an update file on a malicious SMB server. The update file can be replaced after the signature check, before the use, because the write-lock requested by the service does not work on a SMB server. *Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.* This vulnerability affects Firefox \u003c 112, Firefox ESR \u003c 102.10, and Thunderbird \u003c 102.10.","modified":"2025-10-24T05:01:55Z","published":"2023-06-19T10:15:00Z","upstream":["CVE-2023-29532"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-29532"},{"type":"REPORT","url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-13/#CVE-2023-29532"},{"type":"REPORT","url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-14/#CVE-2023-29532"},{"type":"REPORT","url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-15/#CVE-2023-29532"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2023-29532"}],"affected":[{"package":{"name":"mozjs52","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/mozjs52@52.9.1-0ubuntu0.18.04.1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["52.3.1-0ubuntu3","52.3.1-7fakesync1","52.8.1-0ubuntu0.18.04.1","52.9.1-0ubuntu0.18.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"libmozjs-52-0","binary_version":"52.9.1-0ubuntu0.18.04.1"},{"binary_name":"libmozjs-52-dev","binary_version":"52.9.1-0ubuntu0.18.04.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-29532.json"}},{"package":{"name":"mozjs38","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/mozjs38@38.8.0~repack1-0ubuntu4?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["38.8.0~repack1-0ubuntu1","38.8.0~repack1-0ubuntu3","38.8.0~repack1-0ubuntu4"],"ecosystem_specific":{"binaries":[{"binary_name":"libmozjs-38-0","binary_version":"38.8.0~repack1-0ubuntu4"},{"binary_name":"libmozjs-38-dev","binary_version":"38.8.0~repack1-0ubuntu4"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-29532.json"}},{"package":{"name":"mozjs68","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/mozjs68@68.6.0-1ubuntu1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["68.5.0-1~fakesync","68.5.0-2~fakesync","68.6.0-1","68.6.0-1ubuntu1"],"ecosystem_specific":{"binaries":[{"binary_name":"libmozjs-68-0","binary_version":"68.6.0-1ubuntu1"},{"binary_name":"libmozjs-68-dev","binary_version":"68.6.0-1ubuntu1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-29532.json"}},{"package":{"name":"mozjs52","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/mozjs52@52.9.1-1ubuntu3?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["52.9.1-1build1","52.9.1-1ubuntu3"],"ecosystem_specific":{"binaries":[{"binary_name":"libmozjs-52-0","binary_version":"52.9.1-1ubuntu3"},{"binary_name":"libmozjs-52-dev","binary_version":"52.9.1-1ubuntu3"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-29532.json"}},{"package":{"name":"mozjs78","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/mozjs78@78.15.0-4ubuntu1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["78.13.0-1","78.15.0-2","78.15.0-4ubuntu1"],"ecosystem_specific":{"binaries":[{"binary_name":"libmozjs-78-0","binary_version":"78.15.0-4ubuntu1"},{"binary_name":"libmozjs-78-dev","binary_version":"78.15.0-4ubuntu1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-29532.json"}},{"package":{"name":"mozjs91","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/mozjs91@91.10.0-0ubuntu1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["91.5.1-0ubuntu1","91.6.0-1","91.6.0-2","91.7.0-2","91.10.0-0ubuntu1"],"ecosystem_specific":{"binaries":[{"binary_name":"libmozjs-91-0","binary_version":"91.10.0-0ubuntu1"},{"binary_name":"libmozjs-91-dev","binary_version":"91.10.0-0ubuntu1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-29532.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"negligible"}]}