CVE-2017-5378
high-risk
Published 2018-06-11
Hashed codes of JavaScript objects are shared between pages. This allows for pointer leaks because an object's address can be discovered through hash codes, and also allows for data leakage of an object's content using these hash codes. This vulnerability affects Thunderbird < 45.7, Firefox ESR < 45.7, and Firefox < 51.
Do I need to act?
~
1.7% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (20)
References (26)
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2017-0190.html
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2017-0238.html
Third Party Advisory
http://www.securityfocus.com/bid/95769
Third Party Advisory
http://www.securitytracker.com/id/1037693
Issue Tracking
https://bugzilla.mozilla.org/show_bug.cgi?id=1330769
Third Party Advisory
https://security.gentoo.org/glsa/201702-13
Third Party Advisory
https://security.gentoo.org/glsa/201702-22
Third Party Advisory
https://www.debian.org/security/2017/dsa-3771
Third Party Advisory
https://www.debian.org/security/2017/dsa-3832
Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2017-01/
Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2017-02/
Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2017-03/
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2017-0190.html
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2017-0238.html
Third Party Advisory
http://www.securityfocus.com/bid/95769
Third Party Advisory
http://www.securitytracker.com/id/1037693
Issue Tracking
https://bugzilla.mozilla.org/show_bug.cgi?id=1330769
Third Party Advisory
https://security.gentoo.org/glsa/201702-13
and 6 more references
50
/ 100
high-risk
Severity
26/34 · High
Exploitability
4/34 · Minimal
Exposure
20/34 · Moderate