vulnerability
Arch Linux: Privilege escalation (CVE-2017-7836)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:N/C:P/I:P/A:P) | Jun 11, 2018 | Jul 11, 2025 | Nov 27, 2025 |
Severity
5
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:P)
Published
Jun 11, 2018
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
The "pingsender" executable used by the Firefox Health Report before 57.0 dynamically loads a system copy of libcurl, which an attacker could replace. This allows for privilege escalation as the replaced libcurl code will run with Firefox's privileges. This attack requires an attacker have local system access.
Solution
arch-linux-upgrade-latest
References
- CVE-2017-7836
- https://attackerkb.com/topics/CVE-2017-7836
- URL-http://www.securityfocus.com/bid/101832
- URL-http://www.securitytracker.com/id/1039803
- URL-https://bugzilla.mozilla.org/show_bug.cgi?id=1401339
- URL-https://security.archlinux.org/ASA-201711-23
- URL-https://www.mozilla.org/en-US/security/advisories/mfsa2017-24/
- URL-https://www.mozilla.org/security/advisories/mfsa2017-24/
- CWE-427
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.