CNVD-2017-12553
Vulnerability from cnvd - Published: 2017-07-03
VLAI Severity ?
Title
Mozilla Firefox和Firefox ESR for Windows安全绕过漏洞
Description
Mozilla Firefox for Windows是美国Mozilla基金会的一款基于Windows平台的开源Web浏览器。Firefox ESR for Windows是Firefox的一个基于Windows平台的延长支持版本。
基于Windows平台的Mozilla Firefox 54之前的版本和Firefox ESR 52.2之前的版本中存在安全绕过漏洞,该漏洞源于程序未能正确的储存‘Mark of the Web’。攻击者可利用该漏洞绕过安全警告。
Severity
中
Patch Name
Mozilla Firefox和Firefox ESR for Windows安全绕过漏洞的补丁
Patch Description
Mozilla Firefox for Windows是美国Mozilla基金会的一款基于Windows平台的开源Web浏览器。Firefox ESR for Windows是Firefox的一个基于Windows平台的延长支持版本。
基于Windows平台的Mozilla Firefox 54之前的版本和Firefox ESR 52.2之前的版本中存在安全绕过漏洞,该漏洞源于程序未能正确的储存‘Mark of the Web’。攻击者可利用该漏洞绕过安全警告。 目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://www.mozilla.org/en-US/security/advisories/mfsa2017-15/
Reference
http://www.securityfocus.com/bid/99057
Impacted products
| Name | ['Mozilla Firefox <54', 'mozilla Firefox ESR <52.2'] |
|---|
{
"bids": {
"bid": {
"bidNumber": "99057"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2017-7765"
}
},
"description": "Mozilla Firefox for Windows\u662f\u7f8e\u56fdMozilla\u57fa\u91d1\u4f1a\u7684\u4e00\u6b3e\u57fa\u4e8eWindows\u5e73\u53f0\u7684\u5f00\u6e90Web\u6d4f\u89c8\u5668\u3002Firefox ESR for Windows\u662fFirefox\u7684\u4e00\u4e2a\u57fa\u4e8eWindows\u5e73\u53f0\u7684\u5ef6\u957f\u652f\u6301\u7248\u672c\u3002\r\n\r\n\u57fa\u4e8eWindows\u5e73\u53f0\u7684Mozilla Firefox 54\u4e4b\u524d\u7684\u7248\u672c\u548cFirefox ESR 52.2\u4e4b\u524d\u7684\u7248\u672c\u4e2d\u5b58\u5728\u5b89\u5168\u7ed5\u8fc7\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u672a\u80fd\u6b63\u786e\u7684\u50a8\u5b58\u2018Mark of the Web\u2019\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u7ed5\u8fc7\u5b89\u5168\u8b66\u544a\u3002",
"discovererName": "Nils, Tobias Klein, Yuji Tounai of NTT Communications, Abhishek Arya, F. Alonso (revskills), Holger Fuhrmannek, Tyson Smith, Nicolas Trippar of Zimperium zLabs, Michal Bentkowski, Samuel Erb, Jonathan Birch and Microsoft Vulnerability Research, and Seb Pat",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2017-15/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2017-12553",
"openTime": "2017-07-03",
"patchDescription": "Mozilla Firefox for Windows\u662f\u7f8e\u56fdMozilla\u57fa\u91d1\u4f1a\u7684\u4e00\u6b3e\u57fa\u4e8eWindows\u5e73\u53f0\u7684\u5f00\u6e90Web\u6d4f\u89c8\u5668\u3002Firefox ESR for Windows\u662fFirefox\u7684\u4e00\u4e2a\u57fa\u4e8eWindows\u5e73\u53f0\u7684\u5ef6\u957f\u652f\u6301\u7248\u672c\u3002\r\n\r\n\u57fa\u4e8eWindows\u5e73\u53f0\u7684Mozilla Firefox 54\u4e4b\u524d\u7684\u7248\u672c\u548cFirefox ESR 52.2\u4e4b\u524d\u7684\u7248\u672c\u4e2d\u5b58\u5728\u5b89\u5168\u7ed5\u8fc7\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u672a\u80fd\u6b63\u786e\u7684\u50a8\u5b58\u2018Mark of the Web\u2019\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u7ed5\u8fc7\u5b89\u5168\u8b66\u544a\u3002 \u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Mozilla Firefox\u548cFirefox ESR for Windows\u5b89\u5168\u7ed5\u8fc7\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"Mozilla Firefox \u003c54",
"mozilla Firefox ESR \u003c52.2"
]
},
"referenceLink": "http://www.securityfocus.com/bid/99057",
"serverity": "\u4e2d",
"submitTime": "2017-06-23",
"title": "Mozilla Firefox\u548cFirefox ESR for Windows\u5b89\u5168\u7ed5\u8fc7\u6f0f\u6d1e"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…