ALT-PU-2017-1731-1
Closed vulnerabilities
BDU:2017-01833
Уязвимость набора библиотек Network Security Services, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2020-05741
Уязвимость функций анимации SMIL браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05742
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c использованием памяти после освобождения при обработке транзакций в редакторе, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05743
Уязвимость функции FeatureRef::applyValToFeature библиотеки шрифтов Graphite 2 браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05744
Уязвимость функции nsAutoPtr браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05745
Уязвимость функции nsTArray Length() браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05746
Уязвимость функции txExecutionState браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05747
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c использованием памяти после освобождения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05748
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c использованием памяти после освобождения при манипулировании элементами DOM, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05793
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2020-05803
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c использованием памяти после освобождения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05804
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c использованием памяти после освобождения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05833
Уязвимость реализации метода ProcessNextState (netwerk\streamconv\converters\nsBinHexDecoder.cpp) браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05834
Уязвимость реализации метода nsDirIndexParser::ParseData (netwerk\streamconv\converters\nsDirIndexParser.cpp) браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю получить доступ к защищаемой информации
BDU:2020-05842
Уязвимость реализации метода nsDirIndexParser::ParseFormat (netwerk\streamconv\converters\nsDirIndexParser.cpp) браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c отсутствием проверки при индексировании по массиву, позволяющая нарушителю получить доступ к защищаемой информации
BDU:2020-05843
Уязвимость реализации технологии HTTP/2 браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05844
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c использованием памяти после освобождения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05848
Уязвимость компонента WebGL браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-00037
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c выход операции за границы буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность
BDU:2021-00039
Уязвимость реализации функции ConvolvePixel() браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации или вызвать отказ в обслуживании
BDU:2021-00044
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c использованием после освобождения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-00047
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c выходом операции за границы буфера в памяти при манипуляции с деревом доступа DOM, позволяющая нарушителю выполнить произвольный код
BDU:2021-00048
Уязвимость службы сетевой безопасности NSS браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю оказать влияние на целостность данных
Modified: 2024-11-21
CVE-2017-5429
Memory safety bugs were reported in Firefox 52, Firefox ESR 45.8, Firefox ESR 52, and Thunderbird 52. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1104
- RHSA-2017:1104
- RHSA-2017:1106
- RHSA-2017:1106
- RHSA-2017:1201
- RHSA-2017:1201
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1343261%2C1350844%2C1341096%2C1342823%2C1348894%2C1348941%2C1349340%2C1352926%2C1353088%2C
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1343261%2C1350844%2C1341096%2C1342823%2C1348894%2C1348941%2C1349340%2C1352926%2C1353088%2C
- DSA-3831
- DSA-3831
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2017-5432
A use-after-free vulnerability occurs during certain text input selection resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1104
- RHSA-2017:1104
- RHSA-2017:1106
- RHSA-2017:1106
- RHSA-2017:1201
- RHSA-2017:1201
- https://bugzilla.mozilla.org/show_bug.cgi?id=1346654
- https://bugzilla.mozilla.org/show_bug.cgi?id=1346654
- DSA-3831
- DSA-3831
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2017-5433
A use-after-free vulnerability in SMIL animation functions occurs when pointers to animation elements in an array are dropped from the animation controller while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1104
- RHSA-2017:1104
- RHSA-2017:1106
- RHSA-2017:1106
- RHSA-2017:1201
- RHSA-2017:1201
- https://bugzilla.mozilla.org/show_bug.cgi?id=1347168
- https://bugzilla.mozilla.org/show_bug.cgi?id=1347168
- DSA-3831
- DSA-3831
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2017-5434
A use-after-free vulnerability occurs when redirecting focus handling which results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1104
- RHSA-2017:1104
- RHSA-2017:1106
- RHSA-2017:1106
- RHSA-2017:1201
- RHSA-2017:1201
- https://bugzilla.mozilla.org/show_bug.cgi?id=1349946
- https://bugzilla.mozilla.org/show_bug.cgi?id=1349946
- DSA-3831
- DSA-3831
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2017-5435
A use-after-free vulnerability occurs during transaction processing in the editor during design mode interactions. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1104
- RHSA-2017:1104
- RHSA-2017:1106
- RHSA-2017:1106
- RHSA-2017:1201
- RHSA-2017:1201
- https://bugzilla.mozilla.org/show_bug.cgi?id=1350683
- https://bugzilla.mozilla.org/show_bug.cgi?id=1350683
- DSA-3831
- DSA-3831
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2017-5436
An out-of-bounds write in the Graphite 2 library triggered with a maliciously crafted Graphite font. This results in a potentially exploitable crash. This issue was fixed in the Graphite 2 library as well as Mozilla products. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1104
- RHSA-2017:1104
- RHSA-2017:1106
- RHSA-2017:1106
- RHSA-2017:1201
- RHSA-2017:1201
- https://bugzilla.mozilla.org/show_bug.cgi?id=1345461
- https://bugzilla.mozilla.org/show_bug.cgi?id=1345461
- GLSA-201706-25
- GLSA-201706-25
- DSA-3831
- DSA-3831
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2023-11-07
CVE-2017-5437
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2016-10195, CVE-2016-10196, CVE-2016-10197. Reason: This candidate is a duplicate of CVE-2016-10195, CVE-2016-10196, and CVE-2016-10197. Notes: All CVE users should reference CVE-2016-10195, CVE-2016-10196, and/or CVE-2016-10197 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage
Modified: 2024-11-21
CVE-2017-5438
A use-after-free vulnerability during XSLT processing due to the result handler being held by a freed handler during handling. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1104
- RHSA-2017:1104
- RHSA-2017:1106
- RHSA-2017:1106
- RHSA-2017:1201
- RHSA-2017:1201
- https://bugzilla.mozilla.org/show_bug.cgi?id=1336828
- https://bugzilla.mozilla.org/show_bug.cgi?id=1336828
- DSA-3831
- DSA-3831
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2017-5439
A use-after-free vulnerability during XSLT processing due to poor handling of template parameters. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
- 103053
- 103053
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1104
- RHSA-2017:1104
- RHSA-2017:1106
- RHSA-2017:1106
- RHSA-2017:1201
- RHSA-2017:1201
- https://bugzilla.mozilla.org/show_bug.cgi?id=1336830
- https://bugzilla.mozilla.org/show_bug.cgi?id=1336830
- DSA-3831
- DSA-3831
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2017-5440
A use-after-free vulnerability during XSLT processing due to a failure to propagate error conditions during matching while evaluating context, leading to objects being used when they no longer exist. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1104
- RHSA-2017:1104
- RHSA-2017:1106
- RHSA-2017:1106
- RHSA-2017:1201
- RHSA-2017:1201
- https://bugzilla.mozilla.org/show_bug.cgi?id=1336832
- https://bugzilla.mozilla.org/show_bug.cgi?id=1336832
- DSA-3831
- DSA-3831
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2017-5441
A use-after-free vulnerability when holding a selection during scroll events. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1104
- RHSA-2017:1104
- RHSA-2017:1106
- RHSA-2017:1106
- RHSA-2017:1201
- RHSA-2017:1201
- https://bugzilla.mozilla.org/show_bug.cgi?id=1343795
- https://bugzilla.mozilla.org/show_bug.cgi?id=1343795
- DSA-3831
- DSA-3831
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2017-5442
A use-after-free vulnerability during changes in style when manipulating DOM elements. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1104
- RHSA-2017:1104
- RHSA-2017:1106
- RHSA-2017:1106
- RHSA-2017:1201
- RHSA-2017:1201
- https://bugzilla.mozilla.org/show_bug.cgi?id=1347979
- https://bugzilla.mozilla.org/show_bug.cgi?id=1347979
- DSA-3831
- DSA-3831
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2017-5443
An out-of-bounds write vulnerability while decoding improperly formed BinHex format archives. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1104
- RHSA-2017:1104
- RHSA-2017:1106
- RHSA-2017:1106
- RHSA-2017:1201
- RHSA-2017:1201
- https://bugzilla.mozilla.org/show_bug.cgi?id=1342661
- https://bugzilla.mozilla.org/show_bug.cgi?id=1342661
- DSA-3831
- DSA-3831
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2017-5444
A buffer overflow vulnerability while parsing "application/http-index-format" format content when the header contains improperly formatted data. This allows for an out-of-bounds read of data from memory. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1104
- RHSA-2017:1104
- RHSA-2017:1106
- RHSA-2017:1106
- RHSA-2017:1201
- RHSA-2017:1201
- https://bugzilla.mozilla.org/show_bug.cgi?id=1344461
- https://bugzilla.mozilla.org/show_bug.cgi?id=1344461
- DSA-3831
- DSA-3831
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2017-5445
A vulnerability while parsing "application/http-index-format" format content where uninitialized values are used to create an array. This could allow the reading of uninitialized memory into the arrays affected. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1104
- RHSA-2017:1104
- RHSA-2017:1106
- RHSA-2017:1106
- RHSA-2017:1201
- RHSA-2017:1201
- https://bugzilla.mozilla.org/show_bug.cgi?id=1344467
- https://bugzilla.mozilla.org/show_bug.cgi?id=1344467
- DSA-3831
- DSA-3831
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2017-5446
An out-of-bounds read when an HTTP/2 connection to a servers sends "DATA" frames with incorrect data content. This leads to a potentially exploitable crash. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1104
- RHSA-2017:1104
- RHSA-2017:1106
- RHSA-2017:1106
- RHSA-2017:1201
- RHSA-2017:1201
- https://bugzilla.mozilla.org/show_bug.cgi?id=1343505
- https://bugzilla.mozilla.org/show_bug.cgi?id=1343505
- DSA-3831
- DSA-3831
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2017-5447
An out-of-bounds read during the processing of glyph widths during text layout. This results in a potentially exploitable crash and could allow an attacker to read otherwise inaccessible memory. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1104
- RHSA-2017:1104
- RHSA-2017:1106
- RHSA-2017:1106
- RHSA-2017:1201
- RHSA-2017:1201
- https://bugzilla.mozilla.org/show_bug.cgi?id=1343552
- https://bugzilla.mozilla.org/show_bug.cgi?id=1343552
- DSA-3831
- DSA-3831
- 42071
- 42071
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2017-5448
An out-of-bounds write in "ClearKeyDecryptor" while decrypting some Clearkey-encrypted media content. The "ClearKeyDecryptor" code runs within the Gecko Media Plugin (GMP) sandbox. If a second mechanism is found to escape the sandbox, this vulnerability allows for the writing of arbitrary data within memory, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1104
- RHSA-2017:1104
- RHSA-2017:1106
- RHSA-2017:1106
- https://bugzilla.mozilla.org/show_bug.cgi?id=1346648
- https://bugzilla.mozilla.org/show_bug.cgi?id=1346648
- DSA-3831
- DSA-3831
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
Modified: 2024-11-21
CVE-2017-5459
A buffer overflow in WebGL triggerable by web content, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1104
- RHSA-2017:1104
- RHSA-2017:1106
- RHSA-2017:1106
- RHSA-2017:1201
- RHSA-2017:1201
- https://bugzilla.mozilla.org/show_bug.cgi?id=1333858
- https://bugzilla.mozilla.org/show_bug.cgi?id=1333858
- DSA-3831
- DSA-3831
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2017-5460
A use-after-free vulnerability in frame selection triggered by a combination of malicious script content and key presses by a user. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1104
- RHSA-2017:1104
- RHSA-2017:1106
- RHSA-2017:1106
- RHSA-2017:1201
- RHSA-2017:1201
- https://bugzilla.mozilla.org/show_bug.cgi?id=1343642
- https://bugzilla.mozilla.org/show_bug.cgi?id=1343642
- DSA-3831
- DSA-3831
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2017-5461
Mozilla Network Security Services (NSS) before 3.21.4, 3.22.x through 3.28.x before 3.28.4, 3.29.x before 3.29.5, and 3.30.x before 3.30.1 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact by leveraging incorrect base64 operations.
- DSA-3831
- DSA-3831
- DSA-3872
- DSA-3872
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- 98050
- 98050
- 1038320
- 1038320
- RHSA-2017:1100
- RHSA-2017:1100
- RHSA-2017:1101
- RHSA-2017:1101
- RHSA-2017:1102
- RHSA-2017:1102
- RHSA-2017:1103
- RHSA-2017:1103
- https://bugzilla.mozilla.org/show_bug.cgi?id=1344380
- https://bugzilla.mozilla.org/show_bug.cgi?id=1344380
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21.4_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21.4_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.28.4_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.28.4_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.29.5_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.29.5_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.30.1_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.30.1_release_notes
- GLSA-201705-04
- GLSA-201705-04
- https://www.mozilla.org/en-US/security/advisories/mfsa2017-10/#CVE-2017-5461
- https://www.mozilla.org/en-US/security/advisories/mfsa2017-10/#CVE-2017-5461
- https://www.mozilla.org/en-US/security/advisories/mfsa2017-11/#CVE-2017-5461
- https://www.mozilla.org/en-US/security/advisories/mfsa2017-11/#CVE-2017-5461
- https://www.mozilla.org/en-US/security/advisories/mfsa2017-12/#CVE-2017-5461
- https://www.mozilla.org/en-US/security/advisories/mfsa2017-12/#CVE-2017-5461
- https://www.mozilla.org/en-US/security/advisories/mfsa2017-13/#CVE-2017-5461
- https://www.mozilla.org/en-US/security/advisories/mfsa2017-13/#CVE-2017-5461
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com//security-alerts/cpujul2021.html
Modified: 2024-11-21
CVE-2017-5462
A flaw in DRBG number generation within the Network Security Services (NSS) library where the internal state V does not correctly carry bits over. The NSS library has been updated to fix this issue to address this issue and Firefox ESR 52.1 has been updated with NSS version 3.28.4. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- https://bugzilla.mozilla.org/show_bug.cgi?id=1345089
- https://bugzilla.mozilla.org/show_bug.cgi?id=1345089
- GLSA-201705-04
- GLSA-201705-04
- DSA-3831
- DSA-3831
- DSA-3872
- DSA-3872
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2017-5464
During DOM manipulations of the accessibility tree through script, the DOM tree can become out of sync with the accessibility tree, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1104
- RHSA-2017:1104
- RHSA-2017:1106
- RHSA-2017:1106
- RHSA-2017:1201
- RHSA-2017:1201
- https://bugzilla.mozilla.org/show_bug.cgi?id=1347075
- https://bugzilla.mozilla.org/show_bug.cgi?id=1347075
- DSA-3831
- DSA-3831
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2017-5465
An out-of-bounds read while processing SVG content in "ConvolvePixel". This results in a crash and also allows for otherwise inaccessible memory being copied into SVG graphic content, which could then displayed. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1104
- RHSA-2017:1104
- RHSA-2017:1106
- RHSA-2017:1106
- RHSA-2017:1201
- RHSA-2017:1201
- https://bugzilla.mozilla.org/show_bug.cgi?id=1347617
- https://bugzilla.mozilla.org/show_bug.cgi?id=1347617
- DSA-3831
- DSA-3831
- 42072
- 42072
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2017-5469
Fixed potential buffer overflows in generated Firefox code due to CVE-2016-6354 issue in Flex. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1104
- RHSA-2017:1104
- RHSA-2017:1106
- RHSA-2017:1106
- RHSA-2017:1201
- RHSA-2017:1201
- https://bugzilla.mozilla.org/show_bug.cgi?id=1292534
- https://bugzilla.mozilla.org/show_bug.cgi?id=1292534
- DSA-3831
- DSA-3831
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/