← Volver a CVEs
CVE-2017-7814
N/ADescripcion
File downloads encoded with "blob:" and "data:" URL elements bypassed normal file download checks though the Phishing and Malware Protection feature and its block lists of suspicious sites and files. This would allow malicious sites to lure users into downloading executables that would otherwise be detected as suspicious. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
Detalles CVE
Puntuacion CVSS v3.1N/A
Publicado6/11/2018
Ultima modificacion11/25/2025
Fuentenvd
Avistamientos honeypot0
Productos afectados
debian:debian_linuxmozilla:firefoxmozilla:thunderbirdredhat:enterprise_linux_desktopredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_eusredhat:enterprise_linux_workstation
Debilidades (CWE)
CWE-20
Referencias
http://www.securityfocus.com/bid/101059(security@mozilla.org)
http://www.securitytracker.com/id/1039465(security@mozilla.org)
https://access.redhat.com/errata/RHSA-2017:2831(security@mozilla.org)
https://access.redhat.com/errata/RHSA-2017:2885(security@mozilla.org)
https://bugzilla.mozilla.org/show_bug.cgi?id=1376036(security@mozilla.org)
https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html(security@mozilla.org)
https://security.gentoo.org/glsa/201803-14(security@mozilla.org)
https://www.debian.org/security/2017/dsa-3987(security@mozilla.org)
https://www.debian.org/security/2017/dsa-4014(security@mozilla.org)
https://www.mozilla.org/security/advisories/mfsa2017-21/(security@mozilla.org)
https://www.mozilla.org/security/advisories/mfsa2017-22/(security@mozilla.org)
https://www.mozilla.org/security/advisories/mfsa2017-23/(security@mozilla.org)
http://www.securityfocus.com/bid/101059(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1039465(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:2831(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:2885(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.mozilla.org/show_bug.cgi?id=1376036(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/201803-14(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2017/dsa-3987(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2017/dsa-4014(af854a3a-2127-422b-91ae-364da2661108)
https://www.mozilla.org/security/advisories/mfsa2017-21/(af854a3a-2127-422b-91ae-364da2661108)
https://www.mozilla.org/security/advisories/mfsa2017-22/(af854a3a-2127-422b-91ae-364da2661108)
https://www.mozilla.org/security/advisories/mfsa2017-23/(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.