Risk | High |
Patch available | YES |
Number of vulnerabilities | 41 |
CVE-ID | CVE-2017-5433 CVE-2017-5435 CVE-2017-5436 CVE-2017-5461 CVE-2017-5459 CVE-2017-5466 CVE-2017-5434 CVE-2017-5432 CVE-2017-5460 CVE-2017-5438 CVE-2017-5439 CVE-2017-5440 CVE-2017-5441 CVE-2017-5464 CVE-2017-5443 CVE-2017-5444 CVE-2017-5446 CVE-2017-5447 CVE-2017-5465 CVE-2017-5448 CVE-2017-5454 CVE-2017-5455 CVE-2017-5456 CVE-2017-5445 CVE-2017-5449 CVE-2017-5450 CVE-2017-5462 CVE-2017-5463 CVE-2017-5467 CVE-2017-5452 CVE-2017-5453 CVE-2017-5458 CVE-2017-5468 CVE-2017-5430 CVE-2017-5429 CVE-2017-5437 CVE-2016-10197 CVE-2016-10196 CVE-2016-10195 CVE-2017-5469 CVE-2016-6354 CVE-2017-5442 CVE-2017-5451 |
CWE-ID | CWE-416 CWE-787 CWE-119 CWE-79 CWE-125 CWE-265 CWE-200 CWE-20 CWE-121 CWE-122 |
Exploitation vector | Network |
Public exploit |
Public exploit code for vulnerability #18 is available. Public exploit code for vulnerability #19 is available. |
Vulnerable software Subscribe |
Mozilla Firefox Client/Desktop applications / Web browsers Firefox ESR Client/Desktop applications / Web browsers |
Vendor | Mozilla |
Security Bulletin
This security bulletin contains information about 41 vulnerabilities.
EUVDB-ID: #VU6313
Risk: High
CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5433
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to use-after-free error in SMIL animation functions, when pointers to animation elements in an array are dropped from the animation controller while still in use. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.
Vulnerable software versionsMozilla Firefox: 52 - 52.0.2
Firefox ESR: 45 - 52.0.2
External linkshttp://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6314
Risk: High
CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5435
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to use-after-free error during transaction processing in the editor during design mode interactions. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.
Vulnerable software versionsMozilla Firefox: 52 - 52.0.2
Firefox ESR: 45 - 52.0.2
External linkshttp://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6315
Risk: High
CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5436
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error in the Graphite 2 library when processing Graphite fonts. A remote attacker can trigger out-of-bounds write and execute arbitrary code on the target system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.
Vulnerable software versionsMozilla Firefox: 52 - 52.0.2
Firefox ESR: 45 - 52.0.2
External linkshttp://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6316
Risk: High
CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5461
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error during Base64 decoding operation in the Network Security Services (NSS) library. A remote attacker can trigger out-of-bounds write and execute arbitrary code on the target system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.
Vulnerable software versionsMozilla Firefox: 52 - 52.0.2
Firefox ESR: 45 - 52.0.2
External linkshttp://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6317
Risk: High
CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5459
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in WebGL implementation. A remote attacker can trigger buffer overflow and execute arbitrary code on the target system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.
Vulnerable software versionsMozilla Firefox: 52 - 52.0.2
Firefox ESR: 45 - 52.0.2
External linkshttp://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6318
Risk: Low
CVSSv3.1: 5.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5466
CWE-ID:
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform XSS attacks.
The vulnerability exists due to origin confusion when reloading isolated data:text/html URL. If a page is loaded from an original site through a hyperlink and contains a redirect to a data:text/html URL, triggering a reload will run the reloaded data:text/html page with its origin set incorrectly.
Successful exploitation of this vulnerability may allow an attacker to gain access to potentially sensitive information from another domain.
MitigationUpdate to Firefox 53 or Firefox ESR 52.1.
Vulnerable software versionsMozilla Firefox: 52 - 52.0.2
Firefox ESR: 52.0 - 52.0.2
External linkshttp://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6319
Risk: High
CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5434
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to use-after-free error when redirecting focus handling. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.
Vulnerable software versionsMozilla Firefox: 52 - 52.0.2
Firefox ESR: 45 - 52.0.2
External linkshttp://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6320
Risk: High
CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5432
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to use-after-free error during certain text input selection. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.
Vulnerable software versionsMozilla Firefox: 52 - 52.0.2
Firefox ESR: 45 - 52.0.2
External linkshttp://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6321
Risk: High
CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5460
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to use-after-free error in frame selection triggered by a combination of malicious script content and key presses by a user. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.
Vulnerable software versionsMozilla Firefox: 52 - 52.0.2
Firefox ESR: 45 - 52.0.2
External linkshttp://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6322
Risk: High
CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5438
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to use-after-free error during XSLT processing due to the result handler being held by a freed handler during handling. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.
Vulnerable software versionsMozilla Firefox: 52 - 52.0.2
Firefox ESR: 45 - 52.0.2
External linkshttp://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6323
Risk: High
CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5439
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to use-after-free error during XSLT processing due to poor handling of template parameters. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.
Vulnerable software versionsMozilla Firefox: 52 - 52.0.2
Firefox ESR: 45 - 52.0.2
External linkshttp://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6324
Risk: High
CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5440
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to use-after-free error during XSLT processing due to a failure to propagate error conditions during matching while evaluating context, leading to objects being used when they no longer exist. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.
Vulnerable software versionsMozilla Firefox: 52 - 52.0.2
Firefox ESR: 45 - 52.0.2
External linkshttp://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6325
Risk: High
CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5441
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to use-after-free error when holding a selection during scroll events. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.
Vulnerable software versionsMozilla Firefox: 52 - 52.0.2
Firefox ESR: 45 - 52.0.2
External linkshttp://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6326
Risk: High
CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5464
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to memory corruption during DOM manipulations of the accessibility tree through script. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.
Vulnerable software versionsMozilla Firefox: 52 - 52.0.2
Firefox ESR: 45 - 52.0.2
External linkshttp://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6327
Risk: High
CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5443
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error while decoding improperly formed BinHex format archives. A remote attacker can trigger out-of-bounds write and execute arbitrary code on the target system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.
Vulnerable software versionsMozilla Firefox: 52 - 52.0.2
Firefox ESR: 45 - 52.0.2
External linkshttp://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6328
Risk: High
CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5444
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error while parsing application/http-index-format format content when the header contains improperly formatted data. A remote attacker can trigger buffer overflow and execute arbitrary code on the target system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.
Vulnerable software versionsMozilla Firefox: 52 - 52.0.2
Firefox ESR: 45 - 52.0.2
External linkshttp://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6329
Risk: High
CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5446
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error when an HTTP/2 connection to a servers sends DATA
frames with incorrect data content. A remote attacker can trigger out-of-bounds read and gain access to sensitive system memory.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.
Vulnerable software versionsMozilla Firefox: 52 - 52.0.2
Firefox ESR: 45 - 52.0.2
External linkshttp://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6330
Risk: High
CVSSv3.1: 8.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C]
CVE-ID: CVE-2017-5447
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error when processing glyph widths during text layout. A remote attacker can trigger out-of-bounds read and gain access to sensitive system memory.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.
Vulnerable software versionsMozilla Firefox: 52 - 52.0.2
Firefox ESR: 45 - 52.0.2
External linkshttp://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU6331
Risk: High
CVSSv3.1: 8.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C]
CVE-ID: CVE-2017-5465
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error while processing SVG content in ConvolvePixel
. A remote attacker can trigger out-of-bounds read and gain access to sensitive system memory.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.
Vulnerable software versionsMozilla Firefox: 52 - 52.0.2
Firefox ESR: 45 - 52.0.2
External linkshttp://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU6332
Risk: High
CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5448
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error in ClearKeyDecryptor while decrypting some Clearkey-encrypted media content. The ClearKeyDecryptor code runs within the Gecko Media Plugin (GMP) sandbox. If a second mechanism is found to escape the sandbox, this vulnerability allows for the writing of arbitrary data within memory. A remote attacker can trigger out-of-bounds write and execute arbitrary code on the target system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.
Vulnerable software versionsMozilla Firefox: 52 - 52.0.2
Firefox ESR: 45 - 52.0.2
External linkshttp://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/
http://www.zerodayinitiative.com/advisories/ZDI-17-320/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6333
Risk: Medium
CVSSv3.1: 6.4 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5454
CWE-ID:
CWE-265 - Privilege / Sandbox Issues
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to read files from local filesystem.
The vulnerability exists due to an error in sendbox implementation. A remote attacker can use the file picker to access different files than those selected in the file picker through the use of relative paths.
Successful exploitation of the vulnerability may allow an attacker to read arbitrary files from the vulnerable system.
MitigationUpdate to Firefox 53 or Firefox ESR 52.1.
Vulnerable software versionsMozilla Firefox: 52 - 52.0.2
Firefox ESR: 52.0 - 52.0.2
External linkshttp://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6334
Risk: High
CVSSv3.1: 6.2 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5455
CWE-ID:
CWE-265 - Privilege / Sandbox Issues
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to escape sendbox.
The vulnerability exists due to an error in internal feed reader APIs implementation. A remote attacker can use escape the sendbox and leverage another remote code execution vulnerability to compromise vulnerable system.
Successful exploitation of the vulnerability may allow an attacker to escape sendbox and potentially compromise vulnerable system.
MitigationUpdate to Firefox 53 or Firefox ESR 52.1.
Vulnerable software versionsMozilla Firefox: 52 - 52.0.2
Firefox ESR: 52.0 - 52.0.2
External linkshttp://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6335
Risk: Medium
CVSSv3.1: 6.4 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5456
CWE-ID:
CWE-265 - Privilege / Sandbox Issues
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to read files from local filesystem.
The vulnerability exists due to an error in sendbox implementation. A remote attacker can bypass file system access protections in the sandbox using the file system request constructor through an IPC message.
Successful exploitation of the vulnerability may allow an attacker to read arbitrary files from the vulnerable system.
MitigationUpdate to Firefox 53 or Firefox ESR 52.1.
Vulnerable software versionsMozilla Firefox: 52 - 52.0.2
Firefox ESR: 52.0 - 52.0.2
External linkshttp://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6336
Risk: Medium
CVSSv3.1: 6.4 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5445
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to an error when parsing application/http-index-format format content where uninitialized values are used to create an array. A remote attacker can read portions of uninitialized memory.
Successful exploitation of the vulnerability may allow an attacker to gain access to potentially sensitive information.
MitigationUpdate to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.
Vulnerable software versionsMozilla Firefox: 52 - 52.0.2
Firefox ESR: 45 - 52.0.2
External linkshttp://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6337
Risk: Low
CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5449
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to trigger browser crash.
The vulnerability exists due to improper input validation during layout and manipulation of bidirectional unicode text in concert with CSS animations.. A remote attacker can perform a denial of service (DoS) attack.
MitigationUpdate to Firefox 53 or Firefox ESR 52.1.
Vulnerable software versionsMozilla Firefox: 52 - 52.0.2
Firefox ESR: 52.0 - 52.0.2
External linkshttp://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6338
Risk: Low
CVSSv3.1: 4.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5450
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to spoof browser address bar.
The vulnerability exists due to an error when processing using a javascript:
URI. A remote attacker can spoof the addressbar through the user interaction on the addressbar and the onblur event. The event could be used by script to affect text display to make the loaded site appear to be different from the one actually loaded within the addressbar.
This vulnerability affects only Firefox for Android.
MitigationUpdate to Firefox 53.
Vulnerable software versionsMozilla Firefox: 52 - 52.0.2
External linkshttp://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6339
Risk: Low
CVSSv3.1: 4.1 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5462
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionA flaw in DRBG number generation within the Network Security Services (NSS) library where the internal state V does not correctly carry bits over. The NSS library has been updated to fix this issue to address this issue and Firefox has been updated with corresponding version of NSS.
MitigationUpdate to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.
Vulnerable software versionsMozilla Firefox: 52 - 52.0.2
Firefox ESR: 45 - 52.0.2
External linkshttp://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6340
Risk: Low
CVSSv3.1: 4.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5463
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to spoof browser address bar.
The vulnerability exists due to an error when processing reader view. Android intents can be used to launch Firefox for Android in reader mode with a user specified URL. This allows an attacker to spoof the contents of the addressbar as displayed to users.
This vulnerability affects only Firefox for Android.
MitigationUpdate to Firefox 53.
Vulnerable software versionsMozilla Firefox: 52 - 52.0.2
External linkshttp://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6341
Risk: Low
CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5467
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service attack.
The vulnerability exists due to memory corruption when using Skia content when drawing content outside of the bounds of a clipping region. A remote attacker can trigger memory corruption and cause browser crash.
MitigationUpdate to Firefox 53 or Firefox ESR 52.1.
Vulnerable software versionsMozilla Firefox: 52 - 52.0.2
Firefox ESR: 52.0 - 52.0.2
External linkshttp://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6342
Risk: Low
CVSSv3.1: 4.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5452
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to spoof browser address bar.
The vulnerability exists due to an error during scrolling with editable content. Malicious sites can display a spoofed addressbar on a page when the existing location bar on the new page is scrolled out of view if an HTML editable page element is user selected.
This vulnerability affects only Firefox for Android.
MitigationUpdate to Firefox 53.
Vulnerable software versionsMozilla Firefox: 52 - 52.0.2
External linkshttp://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6343
Risk: Low
CVSSv3.1: 5.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5453
CWE-ID:
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a spoofing attack.
The vulnerability exists due to an insufficient sanitization of data sent as URL parameters for a feed's TITLE
element during scrolling with editable content. A remote attacker can inject aritrary HTML code and perform XSS attack.
Update to Firefox 53.
Vulnerable software versionsMozilla Firefox: 52 - 52.0.2
External linkshttp://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6344
Risk: Low
CVSSv3.1: 3.7 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5458
CWE-ID:
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a psoofing attack.
The vulnerability exists due to an insufficient sanitization of data sent as URL, when a javascript:
URL is drag and dropped by a user into the addressbar, the URL will be processed and executed. A remote attacker can trick the victim into executing malicious JavaScript.
Update to Firefox 53.
Vulnerable software versionsMozilla Firefox: 52 - 52.0.2
External linkshttp://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6345
Risk: Low
CVSSv3.1: 2.7 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5468
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to an error connected with incorrect ownership model of privateBrowsing. An attacker can expose certain sensitive data through developer tools. This can result in a non-exploitable crash when manually triggered during debugging.
MitigationUpdate to Firefox 53.
Vulnerable software versionsMozilla Firefox: 52 - 52.0.2
External linkshttp://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6346
Risk: High
CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5430
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to memory corruption errors. A remote attacker can execute arbitrary code on the target system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate to Firefox 53 or Firefox ESR 52.1.
Vulnerable software versionsMozilla Firefox: 52 - 52.0.2
Firefox ESR: 52.0 - 52.0.2
External linkshttp://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6347
Risk: High
CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5429
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to memory corruption errors. A remote attacker can execute arbitrary code on the target system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.
Vulnerable software versionsMozilla Firefox: 52 - 52.0.2
Firefox ESR: 45 - 52.0.2
External linkshttp://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6348
Risk: High
CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5437,CVE-2016-10197
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error in search_make_new() function in evdns.c within libevent library before 2.1.6-beta. A remote attacker can trigger out-of-bounds read and gain access to sensitive system memory.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.
Vulnerable software versionsFirefox ESR: 45 - 52.0.2
Mozilla Firefox: 52 - 52.0.2
External linkshttp://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6349
Risk: High
CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5437,CVE-2016-10196
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error in evutil_parse_sockaddr_port() function in evutil.c within libevent library before 2.1.6-beta. A remote attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.
Vulnerable software versionsFirefox ESR: 45 - 52.0.2
Mozilla Firefox: 52 - 52.0.2
External linkshttp://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6350
Risk: High
CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5437,CVE-2016-10195
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error in name_parse() function in evdns.c within libevent library before 2.1.6-beta. A remote attacker can trigger out-of-bounds read and gain access to sensitive system memory.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.
Vulnerable software versionsFirefox ESR: 45 - 52.0.2
Mozilla Firefox: 52 - 52.0.2
External linkshttp://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6351
Risk: High
CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5469,CVE-2016-6354
CWE-ID:
CWE-122 - Heap-based Buffer Overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error in yy_get_next_buffer() function in Flex before 2.6.1. A remote attacker can trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.
Vulnerable software versionsFirefox ESR: 45 - 52.0.2
Mozilla Firefox: 52 - 52.0.2
External linkshttp://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6355
Risk: High
CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5442
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to use-after-free error during changes in style when manipulating DOM elements. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate to Firefox 53, Firefox ESR 45.9 or Firefox ESR 52.1.
Vulnerable software versionsMozilla Firefox: 52 - 52.0.2
Firefox ESR: 45 - 52.0.2
External linkshttp://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/
http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6356
Risk: Low
CVSSv3.1: 4.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5451
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to spoof browser address bar.
The vulnerability exists due to an error when processing onblur event. A remote attacker can spoof the addressbar through the user interaction on the addressbar and the onblur event. The event could be used by script to affect text display to make the loaded site appear to be different from the one actually loaded within the addressbar.
This vulnerability affects only Firefox for Android.
MitigationUpdate to Firefox 53.
Vulnerable software versionsMozilla Firefox: 52 - 52.0.2
External linkshttp://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.