Уязвимость утечки указателей и данных объектов в Thunderbird и Firefox через совместное использование хешированных кодов JavaScript объектов
Описание
Хеш-коды JavaScript объектов могут быть общими между веб-страницами. Это ведет к утечке указателей, поскольку адрес объекта может быть раскрыт через хеш-коды. Кроме того, это допускает утечку данных содержимого объекта с использованием этих хеш-кодов.
Затронутые версии ПО
- Thunderbird версий ниже 45.7
- Firefox ESR версий ниже 45.7
- Firefox версий ниже 51
Тип уязвимости
Утечка данных
Ссылки
- Third Party Advisory
- Third Party Advisory
- Third Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
- ExploitIssue TrackingVendor Advisory
- Issue TrackingPatchVendor Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
- ExploitIssue TrackingVendor Advisory
- Issue TrackingPatchVendor Advisory
- Third Party Advisory
Уязвимые конфигурации
Одно из
EPSS
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
Связанные уязвимости
Hashed codes of JavaScript objects are shared between pages. This allows for pointer leaks because an object's address can be discovered through hash codes, and also allows for data leakage of an object's content using these hash codes. This vulnerability affects Thunderbird < 45.7, Firefox ESR < 45.7, and Firefox < 51.
Hashed codes of JavaScript objects are shared between pages. This allows for pointer leaks because an object's address can be discovered through hash codes, and also allows for data leakage of an object's content using these hash codes. This vulnerability affects Thunderbird < 45.7, Firefox ESR < 45.7, and Firefox < 51.
Hashed codes of JavaScript objects are shared between pages. This allo ...
Hashed codes of JavaScript objects are shared between pages. This allows for pointer leaks because an object's address can be discovered through hash codes, and also allows for data leakage of an object's content using these hash codes. This vulnerability affects Thunderbird < 45.7, Firefox ESR < 45.7, and Firefox < 51.
EPSS
7.5 High
CVSS3
5 Medium
CVSS2