Description Preview
Overview
This vulnerability (CWE-732: Incorrect Permission Assignment for Critical Resource) affects the sandbox implementation in Mozilla Firefox and Thunderbird on Linux systems. The Gecko Media Plugin (GMP) sandbox is designed to isolate potentially dangerous media content processing from the rest of the system. However, when a seccomp-bpf filter is already running when the GMP sandbox initializes, the sandbox fails to be properly applied. As a result, media content that should be processed within the sandbox runs with reduced security protections, potentially allowing attackers to escape the intended sandbox restrictions and access system resources that should be protected. This issue is specific to Linux systems and does not affect other operating systems.
Remediation
Users and administrators should update to Firefox 52 or later, or Thunderbird 52 or later, which contain fixes for this vulnerability. Mozilla has addressed the issue by ensuring that the Gecko Media Plugin sandbox is properly applied even when a seccomp-bpf filter is already running. If immediate updating is not possible, consider implementing additional system-level security controls to mitigate potential exploitation, such as running the browser with reduced privileges or within a container. Organizations should also ensure they have proper monitoring and detection capabilities to identify potential exploitation attempts.
References
- Mozilla Foundation Security Advisory (MFSA2017-05): https://www.mozilla.org/security/advisories/mfsa2017-05/
- Mozilla Foundation Security Advisory (MFSA2017-09): https://www.mozilla.org/security/advisories/mfsa2017-09/
- Mozilla Bugzilla - Bug 1257361: https://bugzilla.mozilla.org/show_bug.cgi?id=1257361
- SecurityFocus BID: 96694 - http://www.securityfocus.com/bid/96694
- SecurityTracker ID: 1037966 - http://www.securitytracker.com/id/1037966
Industry ExposureMost to leastThis section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
- ManufacturingManufacturing
- Health Care & Social AssistanceHealth Care & Social Assistance
- Transportation & WarehousingTransportation & Warehousing
- Professional, Scientific, & Technical ServicesProfessional, Scientific, & Technical Services
- Public AdministrationPublic Administration
- Finance and InsuranceFinance and Insurance
- Management of Companies & EnterprisesManagement of Companies & Enterprises
- Retail TradeRetail Trade
- Educational ServicesEducational Services
- Other Services (except Public Administration)Other Services (except Public Administration)
- Wholesale TradeWholesale Trade
- Accommodation & Food ServicesAccommodation & Food Services
- Administrative, Support, Waste Management & Remediation ServicesAdministrative, Support, Waste Management & Remediation Services
- Agriculture, Forestry Fishing & HuntingAgriculture, Forestry Fishing & Hunting
- Arts, Entertainment & RecreationArts, Entertainment & Recreation
- ConstructionConstruction
- InformationInformation
- MiningMining
- Real Estate Rental & LeasingReal Estate Rental & Leasing
- UtilitiesUtilities