Описание
File downloads encoded with "blob:" and "data:" URL elements bypassed normal file download checks though the Phishing and Malware Protection feature and its block lists of suspicious sites and files. This would allow malicious sites to lure users into downloading executables that would otherwise be detected as suspicious. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
Релиз | Статус | Примечание |
---|---|---|
artful | released | 56.0+build6-0ubuntu1 |
bionic | released | 56.0+build6-0ubuntu1 |
devel | released | 56.0+build6-0ubuntu1 |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [56.0+build6-0ubuntu0.14.04.1]] |
precise/esm | DNE | |
trusty | released | 56.0+build6-0ubuntu0.14.04.1 |
trusty/esm | DNE | trusty was released [56.0+build6-0ubuntu0.14.04.1] |
upstream | released | 56.0 |
vivid/ubuntu-core | DNE | |
xenial | released | 56.0+build6-0ubuntu0.16.04.1 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
artful | released | 1:52.4.0+build1-0ubuntu2 |
bionic | released | 1:52.4.0+build1-0ubuntu2 |
devel | released | 1:52.4.0+build1-0ubuntu2 |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [1:52.4.0+build1-0ubuntu0.14.04.2]] |
precise/esm | DNE | |
trusty | released | 1:52.4.0+build1-0ubuntu0.14.04.2 |
trusty/esm | DNE | trusty was released [1:52.4.0+build1-0ubuntu0.14.04.2] |
upstream | released | 52.4.0 |
vivid/ubuntu-core | DNE | |
xenial | released | 1:52.4.0+build1-0ubuntu0.16.04.2 |
Показывать по
6.8 Medium
CVSS2
7.8 High
CVSS3
Связанные уязвимости
File downloads encoded with "blob:" and "data:" URL elements bypassed normal file download checks though the Phishing and Malware Protection feature and its block lists of suspicious sites and files. This would allow malicious sites to lure users into downloading executables that would otherwise be detected as suspicious. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
File downloads encoded with "blob:" and "data:" URL elements bypassed normal file download checks though the Phishing and Malware Protection feature and its block lists of suspicious sites and files. This would allow malicious sites to lure users into downloading executables that would otherwise be detected as suspicious. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
File downloads encoded with "blob:" and "data:" URL elements bypassed ...
File downloads encoded with "blob:" and "data:" URL elements bypassed normal file download checks though the Phishing and Malware Protection feature and its block lists of suspicious sites and files. This would allow malicious sites to lure users into downloading executables that would otherwise be detected as suspicious. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
Уязвимость реализации функции защиты от вредоносных сайтов и фишинга Phishing and Malware Protection браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю проводить фишинг-атаки
6.8 Medium
CVSS2
7.8 High
CVSS3