Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2020-05846

Опубликовано: 17 мая 2016
Источник: fstec
CVSS3: 4.3
CVSS2: 4.3
EPSS Низкий

Описание

Уязвимость механизма подмены адресной строки через взаимодействие пользователя с адресной строкой и событием «onblur» браузеров Firefox, Firefox ESR и почтового клиента Thunderbird связана с недостаточной проверкой вводимых данных. Эксплуатация уязвимости может позволить нарушителю, действующему удалённо, проводить спуфинг-атаки

Вендор

ООО «РусБИТех-Астра»
Red Hat Inc.
Canonical Ltd.
АО «ИВК»
Novell Inc.
Mozilla Corp.

Наименование ПО

Astra Linux Special Edition
Red Hat Enterprise Linux
Ubuntu
Альт Линукс СПТ
OpenSUSE Leap
Suse Linux Enterprise Desktop
SUSE Linux Enterprise Server for SAP Applications
SUSE Linux Enterprise Software Development Kit
Suse Linux Enterprise Server
SUSE Linux Enterprise High Performance Computing
SUSE Linux Enterprise Server for Raspberry Pi
Firefox
Thunderbird
Firefox ESR

Версия ПО

1.5 «Смоленск» (Astra Linux Special Edition)
6 (Red Hat Enterprise Linux)
7 (Red Hat Enterprise Linux)
17.04 (Ubuntu)
16.10 (Ubuntu)
16.04 LTS (Ubuntu)
7.0 (Альт Линукс СПТ)
42.2 (OpenSUSE Leap)
42.3 (OpenSUSE Leap)
42.1 (OpenSUSE Leap)
12 SP3 (Suse Linux Enterprise Desktop)
12 SP4 (Suse Linux Enterprise Desktop)
12 SP2 (SUSE Linux Enterprise Server for SAP Applications)
12 SP3 (SUSE Linux Enterprise Software Development Kit)
12 SP4 (SUSE Linux Enterprise Software Development Kit)
12 SP3 (Suse Linux Enterprise Server)
12 SP4 (Suse Linux Enterprise Server)
11 SP4 (Suse Linux Enterprise Server)
11 SP4 (SUSE Linux Enterprise Software Development Kit)
15.0 (OpenSUSE Leap)
12-LTSS (Suse Linux Enterprise Server)
11 SP3-LTSS (SUSE Linux Enterprise Server for SAP Applications)
11 SP4 (SUSE Linux Enterprise Server for SAP Applications)
12 SP1 (SUSE Linux Enterprise Server for SAP Applications)
12 SP1-LTSS (SUSE Linux Enterprise Server for SAP Applications)
12-LTSS (SUSE Linux Enterprise Server for SAP Applications)
12 SP1-LTSS (Suse Linux Enterprise Server)
14.04 ESM (Ubuntu)
12 SP5 (Suse Linux Enterprise Server)
12 SP5 (SUSE Linux Enterprise Software Development Kit)
11 SP3-LTSS (Suse Linux Enterprise Server)
12 SP2 (Suse Linux Enterprise Desktop)
12 SP2 (SUSE Linux Enterprise Software Development Kit)
12 SP5 (SUSE Linux Enterprise High Performance Computing)
12 (SUSE Linux Enterprise Server for SAP Applications)
12 SP2 (SUSE Linux Enterprise Server for Raspberry Pi)
до 53 (Firefox)
до 52.1 (Thunderbird)
до 52.1 (Firefox ESR)

Тип ПО

Операционная система
Прикладное ПО информационных систем

Операционные системы и аппаратные платформы

ООО «РусБИТех-Астра» Astra Linux Special Edition 1.5 «Смоленск»
Red Hat Inc. Red Hat Enterprise Linux 6
Red Hat Inc. Red Hat Enterprise Linux 7
Canonical Ltd. Ubuntu 17.04
Canonical Ltd. Ubuntu 16.10
Canonical Ltd. Ubuntu 16.04 LTS
АО «ИВК» Альт Линукс СПТ 7.0
Novell Inc. OpenSUSE Leap 42.2
Novell Inc. OpenSUSE Leap 42.3
Novell Inc. OpenSUSE Leap 42.1
Novell Inc. Suse Linux Enterprise Desktop 12 SP3
Novell Inc. Suse Linux Enterprise Desktop 12 SP4
Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12 SP2
Novell Inc. Suse Linux Enterprise Server 12 SP3
Novell Inc. Suse Linux Enterprise Server 12 SP4
Novell Inc. Suse Linux Enterprise Server 11 SP4
Novell Inc. OpenSUSE Leap 15.0
Novell Inc. Suse Linux Enterprise Server 12-LTSS
Novell Inc. SUSE Linux Enterprise Server for SAP Applications 11 SP3-LTSS
Novell Inc. SUSE Linux Enterprise Server for SAP Applications 11 SP4
Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12 SP1
Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12 SP1-LTSS
Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12-LTSS
Novell Inc. Suse Linux Enterprise Server 12 SP1-LTSS
Canonical Ltd. Ubuntu 14.04 ESM
Novell Inc. Suse Linux Enterprise Server 12 SP5
Novell Inc. Suse Linux Enterprise Server 11 SP3-LTSS
Novell Inc. Suse Linux Enterprise Desktop 12 SP2
Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 4,3)
Средний уровень опасности (базовая оценка CVSS 3.0 составляет 4,3)

Возможные меры по устранению уязвимости

Использование рекомендаций:
Для продуктов Mozilla:
https://www.mozilla.org/security/advisories/mfsa2017-10/
https://www.mozilla.org/security/advisories/mfsa2017-12/
https://www.mozilla.org/security/advisories/mfsa2017-13/
Для продуктов Red Hat:
https://access.redhat.com/security/cve/cve-2017-5451
Для продуктов Novell Inc.:
https://www.suse.com/security/cve/CVE-2017-5451/
Для Astra Linux:
https://wiki.astralinux.ru/pages/viewpage.action?pageId=1212483
https://wiki.astralinux.ru/astra-linux-se15-bulletin-20201201SE15
Для Альт Линукс:
https://cve.basealt.ru/
Для Ubuntu:
https://ubuntu.com/security/notices/USN-3260-1?_ga=2.91217818.1630830267.1608209597-1543702552.1605094901
https://ubuntu.com/security/notices/USN-3278-1?_ga=2.91217818.1630830267.1608209597-1543702552.1605094901

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Существует в открытом доступе

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 68%
0.00581
Низкий

4.3 Medium

CVSS3

4.3 Medium

CVSS2

Связанные уязвимости

CVSS3: 4.3
ubuntu
около 7 лет назад

A mechanism to spoof the addressbar through the user interaction on the addressbar and the "onblur" event. The event could be used by script to affect text display to make the loaded site appear to be different from the one actually loaded within the addressbar. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 52.1, and Firefox < 53.

CVSS3: 4.3
redhat
больше 8 лет назад

A mechanism to spoof the addressbar through the user interaction on the addressbar and the "onblur" event. The event could be used by script to affect text display to make the loaded site appear to be different from the one actually loaded within the addressbar. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 52.1, and Firefox < 53.

CVSS3: 4.3
nvd
около 7 лет назад

A mechanism to spoof the addressbar through the user interaction on the addressbar and the "onblur" event. The event could be used by script to affect text display to make the loaded site appear to be different from the one actually loaded within the addressbar. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 52.1, and Firefox < 53.

CVSS3: 4.3
debian
около 7 лет назад

A mechanism to spoof the addressbar through the user interaction on th ...

CVSS3: 4.3
github
около 3 лет назад

A mechanism to spoof the addressbar through the user interaction on the addressbar and the "onblur" event. The event could be used by script to affect text display to make the loaded site appear to be different from the one actually loaded within the addressbar. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 52.1, and Firefox < 53.

EPSS

Процентиль: 68%
0.00581
Низкий

4.3 Medium

CVSS3

4.3 Medium

CVSS2