CVE-2017-7805
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
11/06/2018
Last modified:
21/10/2024
Description
During TLS 1.2 exchanges, handshake hashes are generated which point to a message buffer. This saved data is used for later messages but in some cases, the handshake transcript can exceed the space available in the current buffer, causing the allocation of a new buffer. This leaves a pointer pointing to the old, freed buffer, resulting in a use-after-free when handshake hashes are then calculated afterwards. This can result in a potentially exploitable crash. This vulnerability affects Firefox
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:mozilla:firefox:52.4.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:firefox:56.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:thunderbird:52.4.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.securityfocus.com/bid/101059
- http://www.securitytracker.com/id/1039465
- https://access.redhat.com/errata/RHSA-2017:2832
- https://bugzilla.mozilla.org/show_bug.cgi?id=1377618
- https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html
- https://security.gentoo.org/glsa/201803-14
- https://www.debian.org/security/2017/dsa-3987
- https://www.debian.org/security/2017/dsa-3998
- https://www.debian.org/security/2017/dsa-4014
- https://www.mozilla.org/security/advisories/mfsa2017-21/
- https://www.mozilla.org/security/advisories/mfsa2017-22/
- https://www.mozilla.org/security/advisories/mfsa2017-23/



