Closed
Bug 1234401
(CVE-2017-7796)
Opened 9 years ago
Closed 8 years ago
Update logger can delete arbitrary files with the name "update.log"
Categories
(Toolkit :: Application Update, defect)
Tracking
()
RESOLVED
FIXED
mozilla55
People
(Reporter: molly, Assigned: robert.strong.bugs)
Details
(Keywords: sec-low, Whiteboard: [adv-main55+][post-critsmash-triage])
Attachments
(2 files, 2 obsolete files)
2.52 KB,
patch
|
molly
:
review+
|
Details | Diff | Splinter Review |
2.76 KB,
patch
|
molly
:
review+
|
Details | Diff | Splinter Review |
On Windows, the update logging system's initialization procedure includes a step that deletes the file that it plans to write to. The name of this file is hard coded as "update.log", but the path to it is read from the command line. The updater can be invoked through the maintenance service, so anyone able to execute that with the right command line can cause any file with the name update.log anywhere on the system to be deleted, using the very high privilege level that the service gets invoked at.
![]() |
Assignee | |
Comment 1•9 years ago
|
||
Note: this is a spinoff of bug 1212939 which makes it so only a file named update.log is affected. I am not sure there is a decent way to prevent this from happening at this time.
![]() |
Assignee | |
Comment 2•8 years ago
|
||
Matt, I'm thinking that it should be enough to just require that the path to the patch directory ends with updates\0 for this bug. What do you think?
Assignee: nobody → robert.strong.bugs
Status: NEW → ASSIGNED
Attachment #8860292 -
Flags: feedback?(mhowell)
Reporter | ||
Comment 3•8 years ago
|
||
Comment on attachment 8860292 [details] [diff] [review]
patch in progress
Probably fine. This doesn't accomplish all that much, but I don't think this bug merits any more.
Attachment #8860292 -
Flags: feedback?(mhowell) → feedback+
![]() |
Assignee | |
Comment 4•8 years ago
|
||
Attachment #8860292 -
Attachment is obsolete: true
![]() |
Assignee | |
Comment 5•8 years ago
|
||
Try push
https://treeherder.mozilla.org/#/jobs?repo=try&revision=cd4449e37c3fd49e7c3d0b5b211838c3c713ae55
I don't think this is worthwhile uplifting and will likely land this after the other security patches land in early May.
![]() |
Assignee | |
Comment 6•8 years ago
|
||
Forgot to update the test description. Comment only change
Attachment #8860567 -
Attachment is obsolete: true
![]() |
Assignee | |
Updated•8 years ago
|
Attachment #8860565 -
Flags: review?(mhowell)
![]() |
Assignee | |
Updated•8 years ago
|
Attachment #8860572 -
Flags: review?(mhowell)
![]() |
Assignee | |
Comment 7•8 years ago
|
||
Also pushed to oak so I can manually verify
![]() |
Assignee | |
Updated•8 years ago
|
status-firefox53:
--- → wontfix
status-firefox54:
--- → wontfix
status-firefox55:
--- → affected
status-firefox-esr45:
--- → wontfix
status-firefox-esr52:
--- → wontfix
Reporter | ||
Updated•8 years ago
|
Attachment #8860565 -
Flags: review?(mhowell) → review+
Reporter | ||
Updated•8 years ago
|
Attachment #8860572 -
Flags: review?(mhowell) → review+
![]() |
Assignee | |
Comment 8•8 years ago
|
||
Comment on attachment 8860565 [details] [diff] [review]
client patch rev1
Pushed to mozilla-inbound
https://hg.mozilla.org/integration/mozilla-inbound/rev/212ac7e82d3287f884c0cbf34ec36bd4977f7e78
![]() |
Assignee | |
Comment 9•8 years ago
|
||
Comment on attachment 8860572 [details] [diff] [review]
test patch rev1
Pushed to mozilla-inbound
https://hg.mozilla.org/integration/mozilla-inbound/rev/10de1d8666abf1eb61a47545598aeec88222c49e
I have patches for beta and esr that I will attach soon.
![]() |
Assignee | |
Comment 10•8 years ago
|
||
Merged to mozilla-central
https://hg.mozilla.org/mozilla-central/rev/212ac7e82d32
https://hg.mozilla.org/mozilla-central/rev/10de1d8666ab
Status: ASSIGNED → RESOLVED
Closed: 8 years ago
Flags: in-testsuite+
Resolution: --- → FIXED
Target Milestone: --- → mozilla55
Updated•8 years ago
|
Group: toolkit-core-security → core-security-release
Updated•8 years ago
|
Whiteboard: [adv-main55+]
Updated•8 years ago
|
Alias: CVE-2017-7796
Updated•8 years ago
|
Flags: qe-verify-
Whiteboard: [adv-main55+] → [adv-main55+][post-critsmash-triage]
Updated•7 years ago
|
Group: core-security-release
You need to log in
before you can comment on or make changes to this bug.
Description
•