Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-5388

Опубликовано: 11 июн. 2018
Источник: debian
EPSS Низкий

Описание

A STUN server in conjunction with a large number of "webkitRTCPeerConnection" objects can be used to send large STUN packets in a short period of time due to a lack of rate limiting being applied on e10s systems, allowing for a denial of service attack. This vulnerability affects Firefox < 51.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxfixed51.0-1package
firefox-esrnot-affectedpackage

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5388

EPSS

Процентиль: 79%
0.0128
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 7 лет назад

A STUN server in conjunction with a large number of "webkitRTCPeerConnection" objects can be used to send large STUN packets in a short period of time due to a lack of rate limiting being applied on e10s systems, allowing for a denial of service attack. This vulnerability affects Firefox < 51.

CVSS3: 7.5
nvd
больше 7 лет назад

A STUN server in conjunction with a large number of "webkitRTCPeerConnection" objects can be used to send large STUN packets in a short period of time due to a lack of rate limiting being applied on e10s systems, allowing for a denial of service attack. This vulnerability affects Firefox < 51.

CVSS3: 7.5
github
больше 3 лет назад

A STUN server in conjunction with a large number of "webkitRTCPeerConnection" objects can be used to send large STUN packets in a short period of time due to a lack of rate limiting being applied on e10s systems, allowing for a denial of service attack. This vulnerability affects Firefox < 51.

suse-cvrf
около 9 лет назад

Security update for MozillaFirefox

EPSS

Процентиль: 79%
0.0128
Низкий