Vulnerability Description
Hashed codes of JavaScript objects are shared between pages. This allows for pointer leaks because an object's address can be discovered through hash codes, and also allows for data leakage of an object's content using these hash codes. This vulnerability affects Thunderbird < 45.7, Firefox ESR < 45.7, and Firefox < 51.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Debian | Debian Linux | 8.0 |
| Redhat | Enterprise Linux | 5.0 |
| Redhat | Enterprise Linux Desktop | 5.0 |
| Redhat | Enterprise Linux Server | 5.0 |
| Redhat | Enterprise Linux Server Aus | 7.3 |
| Redhat | Enterprise Linux Server Eus | 7.3 |
| Redhat | Enterprise Linux Workstation | 5.0 |
| Mozilla | Thunderbird | < 45.7.0 |
| Mozilla | Firefox | < 51.0 |
Related Weaknesses (CWE)
References
- http://rhn.redhat.com/errata/RHSA-2017-0190.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2017-0238.htmlThird Party Advisory
- http://www.securityfocus.com/bid/95769Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1037693Third Party AdvisoryVDB Entry
- https://bugzilla.mozilla.org/show_bug.cgi?id=1312001ExploitIssue TrackingVendor Advisory
- https://bugzilla.mozilla.org/show_bug.cgi?id=1330769Issue TrackingPatchVendor Advisory
- https://security.gentoo.org/glsa/201702-13Third Party Advisory
- https://security.gentoo.org/glsa/201702-22Third Party Advisory
- https://www.debian.org/security/2017/dsa-3771Third Party Advisory
- https://www.debian.org/security/2017/dsa-3832Third Party Advisory
- https://www.mozilla.org/security/advisories/mfsa2017-01/Vendor Advisory
- https://www.mozilla.org/security/advisories/mfsa2017-02/Vendor Advisory
- https://www.mozilla.org/security/advisories/mfsa2017-03/Vendor Advisory
- http://rhn.redhat.com/errata/RHSA-2017-0190.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2017-0238.htmlThird Party Advisory
FAQ
What is CVE-2017-5378?
CVE-2017-5378 is a vulnerability with a CVSS score of 7.5 (HIGH). Hashed codes of JavaScript objects are shared between pages. This allows for pointer leaks because an object's address can be discovered through hash codes, and also allows for data leakage of an obje...
How severe is CVE-2017-5378?
CVE-2017-5378 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-5378?
Check the references section above for vendor advisories and patch information. Affected products include: Debian Debian Linux, Redhat Enterprise Linux, Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Server, Redhat Enterprise Linux Server Aus.