Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-5378

Опубликовано: 11 июн. 2018
Источник: debian

Описание

Hashed codes of JavaScript objects are shared between pages. This allows for pointer leaks because an object's address can be discovered through hash codes, and also allows for data leakage of an object's content using these hash codes. This vulnerability affects Thunderbird < 45.7, Firefox ESR < 45.7, and Firefox < 51.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxfixed51.0-1package
firefox-esrfixed45.7.0esr-1package
icedovefixed1:45.7.1-1package

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5378

  • https://www.mozilla.org/en-US/security/advisories/mfsa2017-02/#CVE-2017-5378

  • https://www.mozilla.org/en-US/security/advisories/mfsa2017-03/#CVE-2017-5378

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 7 лет назад

Hashed codes of JavaScript objects are shared between pages. This allows for pointer leaks because an object's address can be discovered through hash codes, and also allows for data leakage of an object's content using these hash codes. This vulnerability affects Thunderbird < 45.7, Firefox ESR < 45.7, and Firefox < 51.

CVSS3: 7.5
redhat
почти 9 лет назад

Hashed codes of JavaScript objects are shared between pages. This allows for pointer leaks because an object's address can be discovered through hash codes, and also allows for data leakage of an object's content using these hash codes. This vulnerability affects Thunderbird < 45.7, Firefox ESR < 45.7, and Firefox < 51.

CVSS3: 7.5
nvd
больше 7 лет назад

Hashed codes of JavaScript objects are shared between pages. This allows for pointer leaks because an object's address can be discovered through hash codes, and also allows for data leakage of an object's content using these hash codes. This vulnerability affects Thunderbird < 45.7, Firefox ESR < 45.7, and Firefox < 51.

CVSS3: 7.5
github
больше 3 лет назад

Hashed codes of JavaScript objects are shared between pages. This allows for pointer leaks because an object's address can be discovered through hash codes, and also allows for data leakage of an object's content using these hash codes. This vulnerability affects Thunderbird < 45.7, Firefox ESR < 45.7, and Firefox < 51.

oracle-oval
почти 9 лет назад

ELSA-2017-0238: thunderbird security update (IMPORTANT)