Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2017-7814

Опубликовано: 11 июн. 2018
Источник: ubuntu
Приоритет: medium
CVSS2: 6.8
CVSS3: 7.8

Описание

File downloads encoded with "blob:" and "data:" URL elements bypassed normal file download checks though the Phishing and Malware Protection feature and its block lists of suspicious sites and files. This would allow malicious sites to lure users into downloading executables that would otherwise be detected as suspicious. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.

РелизСтатусПримечание
artful

released

56.0+build6-0ubuntu1
bionic

released

56.0+build6-0ubuntu1
devel

released

56.0+build6-0ubuntu1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [56.0+build6-0ubuntu0.14.04.1]]
precise/esm

DNE

trusty

released

56.0+build6-0ubuntu0.14.04.1
trusty/esm

DNE

trusty was released [56.0+build6-0ubuntu0.14.04.1]
upstream

released

56.0
vivid/ubuntu-core

DNE

xenial

released

56.0+build6-0ubuntu0.16.04.1

Показывать по

РелизСтатусПримечание
artful

released

1:52.4.0+build1-0ubuntu2
bionic

released

1:52.4.0+build1-0ubuntu2
devel

released

1:52.4.0+build1-0ubuntu2
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [1:52.4.0+build1-0ubuntu0.14.04.2]]
precise/esm

DNE

trusty

released

1:52.4.0+build1-0ubuntu0.14.04.2
trusty/esm

DNE

trusty was released [1:52.4.0+build1-0ubuntu0.14.04.2]
upstream

released

52.4.0
vivid/ubuntu-core

DNE

xenial

released

1:52.4.0+build1-0ubuntu0.16.04.2

Показывать по

6.8 Medium

CVSS2

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
redhat
почти 8 лет назад

File downloads encoded with "blob:" and "data:" URL elements bypassed normal file download checks though the Phishing and Malware Protection feature and its block lists of suspicious sites and files. This would allow malicious sites to lure users into downloading executables that would otherwise be detected as suspicious. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.

CVSS3: 7.8
nvd
около 7 лет назад

File downloads encoded with "blob:" and "data:" URL elements bypassed normal file download checks though the Phishing and Malware Protection feature and its block lists of suspicious sites and files. This would allow malicious sites to lure users into downloading executables that would otherwise be detected as suspicious. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.

CVSS3: 7.8
debian
около 7 лет назад

File downloads encoded with "blob:" and "data:" URL elements bypassed ...

CVSS3: 7.8
github
около 3 лет назад

File downloads encoded with "blob:" and "data:" URL elements bypassed normal file download checks though the Phishing and Malware Protection feature and its block lists of suspicious sites and files. This would allow malicious sites to lure users into downloading executables that would otherwise be detected as suspicious. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.

CVSS3: 7.5
fstec
около 8 лет назад

Уязвимость реализации функции защиты от вредоносных сайтов и фишинга Phishing and Malware Protection браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю проводить фишинг-атаки

6.8 Medium

CVSS2

7.8 High

CVSS3