7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.935 High
EPSS
Percentile
99.1%
Severity: Critical
Date : 2017-01-29
CVE-ID : CVE-2017-5373 CVE-2017-5374 CVE-2017-5375 CVE-2017-5376
CVE-2017-5377 CVE-2017-5378 CVE-2017-5379 CVE-2017-5380
CVE-2017-5381 CVE-2017-5382 CVE-2017-5383 CVE-2017-5384
CVE-2017-5385 CVE-2017-5386 CVE-2017-5387 CVE-2017-5388
CVE-2017-5389 CVE-2017-5390 CVE-2017-5391 CVE-2017-5393
CVE-2017-5396
Package : firefox
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-157
The package firefox before version 51.0.1-1 is vulnerable to multiple
issues including arbitrary code execution, access restriction bypass,
information disclosure, privilege escalation, arbitrary file overwrite,
content spoofing and denial of service.
Upgrade to 51.0.1-1.
The problems have been fixed upstream in version 51.0.
None.
Several memory safety bugs have been found in Firefox < 51 and
Thunderbird < 47.5. Some of these bugs showed evidence of memory
corruption and we presume that with enough effort that some of these
could be exploited to run arbitrary code.
Several memory safety bugs have been found in Firefox < 51. Some of
these bugs showed evidence of memory corruption and we presume that
with enough effort that some of these could be exploited to run
arbitrary code.
JIT code allocation in Firefox < 51 and Thunderbird < 45.7 can allow
for a bypass of ASLR and DEP protections leading to potential memory
corruption attacks.
A use-after-free vulnerability has been found in Firefox < 51 and
Thunderbird < 45.7, while manipulating XSL in XSLT documents.
A memory corruption vulnerability in Skia that can occur when using
transforms to make gradients, resulting in a potentially exploitable
crash.
An information disclosure vulnerability has been found in Firefox < 51
and Thunderbird < 45.7, where hashed codes of JavaScript objects are
shared between pages. This allows for pointer leaks because an object’s
address can be discovered through hash codes, and also allows for data
leakage of an object’s content using these hash codes.
A use-after-free vulnerability has been found in Firefox < 51, in Web
Animations, when interacting with cycle collection.
A potential use-after-free vulnerability during DOM manipulation of SVG
content has been in Firefox < 51 and Thunderbird < 45.7.
The “export” function in the Firefox < 51 Certificate Viewer can force
local filesystem navigation when the “common name” in a certificate
contains slashes, allowing certificate content to be saved in unsafe
locations with an arbitrary filename.
Feed preview for RSS feeds in Firefox < 51 can be used to capture
errors and exceptions generated by privileged content, allowing for the
exposure of internal information not meant to be seen by web content.
URLs containing certain unicode glyphs for alternative hyphens and
quotes do not properly trigger punycode display in Firefox < 51 and
Thunderbird < 45.7, allowing for domain name spoofing attacks in the
location bar.
Proxy Auto-Config (PAC) files in Firefox < 51 can specify a JavaScript
function called for all URL requests with the full URL path which
exposes more information than would be sent to the proxy itself in the
case of HTTPS. Normally the Proxy Auto-Config file is specified by the
user or machine owner and presumed to be non-malicious, but if a user
has enabled Web Proxy Auto Detect (WPAD) this file can be served
remotely.
In Firefox < 51, data sent with in multipart channels, such as the
multipart/x-mixed-replace MIME type, will ignore the referrer-policy
response header, leading to potential information disclosure for sites
using this header.
WebExtension scripts in Firefox < 51 can use the data: protocol to
affect pages loaded by other web extensions using this protocol,
leading to potential data disclosure or privilege escalation in
affected extensions.
The existence of a specifically requested local file can be found in
Firefox < 51 due to the double firing of the onerror when the source
attribute on a <track> tag refers to a file that does not exist if the
source page is loaded locally.
In Firefox < 51, a STUN server in conjunction with a large number of
webkitRTCPeerConnection objects can be used to send large STUN packets
in a short period of time due to a lack of rate limiting being applied
on e10s systems, allowing for a denial of service attack.
WebExtensions in Firefox < 51 could use the mozAddonManager API by
modifying the CSP headers on sites with the appropriate permissions and
then using host requests to redirect script loads to a malicious site.
This allows a malicious extension to then install additional extensions
without explicit user permission.
The JSON viewer in the Developer Tools in Firefox < 51 and Thunderbird
< 45.7 uses insecure methods to create a communication channel for
copying and viewing JSON or HTTP headers data, allowing for potential
privilege escalation.
In Firefox < 51, special about: pages used by web content, such as RSS
feeds, can load privileged about: pages in an iframe. If a content-
injection bug were found in one of those pages this could allow for
potential privilege escalation.
The mozAddonManager in Firefox < 51 allows for the installation of
extensions from the CDN for addons.mozilla.org, a publicly accessible
site. This could allow malicious extensions to install additional
extensions from the CDN in combination with an XSS attack on Mozilla
AMO sites.
A use-after-free vulnerability has been found in the Media Decoder of
Firefox < 51 and Thunderbird < 45.7, when working with media files when
some events are fired after the media elements are freed from memory.
A remote attacker can access sensitive information, bypass access
restrictions, overwrite arbitrary files, spoof content, escalate
privileges and execute arbitrary code on the affected host.
https://www.mozilla.org/en-US/security/advisories/mfsa2017-01
https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5373
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1322315%2C1328834%2C1322420%2C1285833%2C1285960%2C1328251%2C1331058%2C1325938%2C1325877
https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5374
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1325344%2C1317501%2C1311319%2C1329989%2C1300145%2C1322305%2C1288561%2C1295747%2C1318766%2C1297808%2C1321374%2C1324810%2C1313385%2C1319888%2C1302231%2C1307458%2C1293327%2C1315447%2C1319456
https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5375
https://bugzilla.mozilla.org/show_bug.cgi?id=1325200
https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5376
https://bugzilla.mozilla.org/show_bug.cgi?id=1311687
https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5377
https://bugzilla.mozilla.org/show_bug.cgi?id=1306883
https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5378
https://bugzilla.mozilla.org/show_bug.cgi?id=1312001
https://bugzilla.mozilla.org/show_bug.cgi?id=1330769
https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5379
https://bugzilla.mozilla.org/show_bug.cgi?id=1309198
https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5380
https://bugzilla.mozilla.org/show_bug.cgi?id=1322107
https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5381
https://bugzilla.mozilla.org/show_bug.cgi?id=1017616
https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5382
https://bugzilla.mozilla.org/show_bug.cgi?id=1295322
https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5383
https://bugzilla.mozilla.org/show_bug.cgi?id=1323338
https://bugzilla.mozilla.org/show_bug.cgi?id=1324716
https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5384
https://bugzilla.mozilla.org/show_bug.cgi?id=1255474
https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5385
https://bugzilla.mozilla.org/show_bug.cgi?id=1295945
https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5386
https://bugzilla.mozilla.org/show_bug.cgi?id=1319070
https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5387
https://bugzilla.mozilla.org/show_bug.cgi?id=1295023
https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5388
https://bugzilla.mozilla.org/show_bug.cgi?id=1281482
https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5389
https://bugzilla.mozilla.org/show_bug.cgi?id=1308688
https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5390
https://bugzilla.mozilla.org/show_bug.cgi?id=1297361
https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5391
https://bugzilla.mozilla.org/show_bug.cgi?id=1309310
https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5393
https://bugzilla.mozilla.org/show_bug.cgi?id=1309282
https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5396
https://bugzilla.mozilla.org/show_bug.cgi?id=1329403
https://security.archlinux.org/CVE-2017-5373
https://security.archlinux.org/CVE-2017-5374
https://security.archlinux.org/CVE-2017-5375
https://security.archlinux.org/CVE-2017-5376
https://security.archlinux.org/CVE-2017-5377
https://security.archlinux.org/CVE-2017-5378
https://security.archlinux.org/CVE-2017-5379
https://security.archlinux.org/CVE-2017-5380
https://security.archlinux.org/CVE-2017-5381
https://security.archlinux.org/CVE-2017-5382
https://security.archlinux.org/CVE-2017-5383
https://security.archlinux.org/CVE-2017-5384
https://security.archlinux.org/CVE-2017-5385
https://security.archlinux.org/CVE-2017-5386
https://security.archlinux.org/CVE-2017-5387
https://security.archlinux.org/CVE-2017-5388
https://security.archlinux.org/CVE-2017-5389
https://security.archlinux.org/CVE-2017-5390
https://security.archlinux.org/CVE-2017-5391
https://security.archlinux.org/CVE-2017-5393
https://security.archlinux.org/CVE-2017-5396
addons.mozilla.org
bugzilla.mozilla.org/buglist.cgi?bug_id=1322315%2C1328834%2C1322420%2C1285833%2C1285960%2C1328251%2C1331058%2C1325938%2C1325877
bugzilla.mozilla.org/buglist.cgi?bug_id=1325344%2C1317501%2C1311319%2C1329989%2C1300145%2C1322305%2C1288561%2C1295747%2C1318766%2C1297808%2C1321374%2C1324810%2C1313385%2C1319888%2C1302231%2C1307458%2C1293327%2C1315447%2C1319456
bugzilla.mozilla.org/show_bug.cgi?id=1017616
bugzilla.mozilla.org/show_bug.cgi?id=1255474
bugzilla.mozilla.org/show_bug.cgi?id=1281482
bugzilla.mozilla.org/show_bug.cgi?id=1295023
bugzilla.mozilla.org/show_bug.cgi?id=1295322
bugzilla.mozilla.org/show_bug.cgi?id=1295945
bugzilla.mozilla.org/show_bug.cgi?id=1297361
bugzilla.mozilla.org/show_bug.cgi?id=1306883
bugzilla.mozilla.org/show_bug.cgi?id=1308688
bugzilla.mozilla.org/show_bug.cgi?id=1309198
bugzilla.mozilla.org/show_bug.cgi?id=1309282
bugzilla.mozilla.org/show_bug.cgi?id=1309310
bugzilla.mozilla.org/show_bug.cgi?id=1311687
bugzilla.mozilla.org/show_bug.cgi?id=1312001
bugzilla.mozilla.org/show_bug.cgi?id=1319070
bugzilla.mozilla.org/show_bug.cgi?id=1322107
bugzilla.mozilla.org/show_bug.cgi?id=1323338
bugzilla.mozilla.org/show_bug.cgi?id=1324716
bugzilla.mozilla.org/show_bug.cgi?id=1325200
bugzilla.mozilla.org/show_bug.cgi?id=1329403
bugzilla.mozilla.org/show_bug.cgi?id=1330769
security.archlinux.org/AVG-157
security.archlinux.org/CVE-2017-5373
security.archlinux.org/CVE-2017-5374
security.archlinux.org/CVE-2017-5375
security.archlinux.org/CVE-2017-5376
security.archlinux.org/CVE-2017-5377
security.archlinux.org/CVE-2017-5378
security.archlinux.org/CVE-2017-5379
security.archlinux.org/CVE-2017-5380
security.archlinux.org/CVE-2017-5381
security.archlinux.org/CVE-2017-5382
security.archlinux.org/CVE-2017-5383
security.archlinux.org/CVE-2017-5384
security.archlinux.org/CVE-2017-5385
security.archlinux.org/CVE-2017-5386
security.archlinux.org/CVE-2017-5387
security.archlinux.org/CVE-2017-5388
security.archlinux.org/CVE-2017-5389
security.archlinux.org/CVE-2017-5390
security.archlinux.org/CVE-2017-5391
security.archlinux.org/CVE-2017-5393
security.archlinux.org/CVE-2017-5396
www.mozilla.org/en-US/security/advisories/mfsa2017-01
www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5373
www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5374
www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5375
www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5376
www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5377
www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5378
www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5379
www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5380
www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5381
www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5382
www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5383
www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5384
www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5385
www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5386
www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5387
www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5388
www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5389
www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5390
www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5391
www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5393
www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5396
7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.935 High
EPSS
Percentile
99.1%