CVE-2016-9064

Publication date 16 November 2016

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

5.9 · Medium

Score breakdown

Add-on updates failed to verify that the add-on ID inside the signed package matched the ID of the add-on being updated. An attacker who could perform a man-in-the-middle attack on the user's connection to the update server and defeat the certificate pinning protection could provide a malicious signed add-on instead of a valid update. This vulnerability affects Firefox ESR < 45.5 and Firefox < 50.

Status

Package Ubuntu Release Status
firefox 16.10 yakkety
Fixed 50.0+build2-0ubuntu0.16.10.2
16.04 LTS xenial
Fixed 50.0+build2-0ubuntu0.16.04.2
14.04 LTS trusty
Fixed 50.0+build2-0ubuntu0.14.04.2
12.04 LTS precise
Fixed 50.0+build2-0ubuntu0.12.04.2
thunderbird 16.10 yakkety
Not affected
16.04 LTS xenial
Not affected
14.04 LTS trusty Not in release
12.04 LTS precise
Not affected

Severity score breakdown

Parameter Value
Base score 5.9 · Medium
Attack vector Network
Attack complexity High
Privileges required None
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact High
Availability impact None
Vector CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

References

Related Ubuntu Security Notices (USN)

    • USN-3124-1
    • Firefox vulnerabilities
    • 19 November 2016

Other references