← Retour aux CVEs
CVE-2017-7828
N/ADescription
A use-after-free vulnerability can occur when flushing and resizing layout because the "PressShell" object has been freed while still in use. This results in a potentially exploitable crash during these operations. This vulnerability affects Firefox < 57, Firefox ESR < 52.5, and Thunderbird < 52.5.
Details CVE
Score CVSS v3.1N/A
Publie6/11/2018
Derniere modification11/25/2025
Sourcenvd
Observations honeypot0
Produits affectes
debian:debian_linuxmozilla:firefoxmozilla:thunderbirdredhat:enterprise_linux_desktopredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_eusredhat:enterprise_linux_workstation
Faiblesses (CWE)
CWE-416
References
http://www.securityfocus.com/bid/101832(security@mozilla.org)
http://www.securitytracker.com/id/1039803(security@mozilla.org)
https://access.redhat.com/errata/RHSA-2017:3247(security@mozilla.org)
https://access.redhat.com/errata/RHSA-2017:3372(security@mozilla.org)
https://bugzilla.mozilla.org/show_bug.cgi?id=1406750(security@mozilla.org)
https://bugzilla.mozilla.org/show_bug.cgi?id=1412252(security@mozilla.org)
https://lists.debian.org/debian-lts-announce/2017/11/msg00018.html(security@mozilla.org)
https://lists.debian.org/debian-lts-announce/2017/12/msg00001.html(security@mozilla.org)
https://www.debian.org/security/2017/dsa-4035(security@mozilla.org)
https://www.debian.org/security/2017/dsa-4061(security@mozilla.org)
https://www.debian.org/security/2017/dsa-4075(security@mozilla.org)
https://www.mozilla.org/security/advisories/mfsa2017-24/(security@mozilla.org)
https://www.mozilla.org/security/advisories/mfsa2017-25/(security@mozilla.org)
https://www.mozilla.org/security/advisories/mfsa2017-26/(security@mozilla.org)
http://www.securityfocus.com/bid/101832(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1039803(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:3247(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:3372(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.mozilla.org/show_bug.cgi?id=1406750(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.mozilla.org/show_bug.cgi?id=1412252(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2017/11/msg00018.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2017/12/msg00001.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2017/dsa-4035(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2017/dsa-4061(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2017/dsa-4075(af854a3a-2127-422b-91ae-364da2661108)
https://www.mozilla.org/security/advisories/mfsa2017-24/(af854a3a-2127-422b-91ae-364da2661108)
https://www.mozilla.org/security/advisories/mfsa2017-25/(af854a3a-2127-422b-91ae-364da2661108)
https://www.mozilla.org/security/advisories/mfsa2017-26/(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.