Security bypass in Firefox ESR - CVE-2017-7765
Published: June 14, 2017 / Updated: May 26, 2020
Vulnerability identifier: #VU7076
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-7765
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Mozilla
Affected software:
Firefox ESR
Firefox ESR
Detailed vulnerability description
The vulnerability allows a remote attacker to bypass security restrictions on the target system.
The weakness exists due to incorrect saving of the "Mark of the Web" on Windows when files with very long names were downloaded from the Internet. A remote attacker can trick the victim into downloading a specially crafted file, execute it and bypass "Mark of the Web".
Successful exploitation of the vulnerability may result in further attacks.
The weakness exists due to incorrect saving of the "Mark of the Web" on Windows when files with very long names were downloaded from the Internet. A remote attacker can trick the victim into downloading a specially crafted file, execute it and bypass "Mark of the Web".
Successful exploitation of the vulnerability may result in further attacks.
How to mitigate CVE-2017-7765
Update to version 52.2.