Vulnerability Description
A use-after-free vulnerability can occur in WebSockets when the object holding the connection is freed before the disconnection operation is finished. This results in an exploitable crash. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Debian | Debian Linux | 8.0 |
| Redhat | Enterprise Linux | 6.0 |
| Redhat | Enterprise Linux Desktop | 6.0 |
| Redhat | Enterprise Linux Server | 6.0 |
| Redhat | Enterprise Linux Server Aus | 7.3 |
| Redhat | Enterprise Linux Server Eus | 7.3 |
| Redhat | Enterprise Linux Workstation | 6.0 |
| Mozilla | Firefox | < 55.0 |
| Mozilla | Thunderbird | < 52.3.0 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/100196Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1039124Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2017:2456Third Party Advisory
- https://access.redhat.com/errata/RHSA-2017:2534Third Party Advisory
- https://bugzilla.mozilla.org/show_bug.cgi?id=1374047ExploitIssue TrackingPatch
- https://security.gentoo.org/glsa/201803-14Third Party Advisory
- https://www.debian.org/security/2017/dsa-3928Third Party Advisory
- https://www.debian.org/security/2017/dsa-3968Third Party Advisory
- https://www.mozilla.org/security/advisories/mfsa2017-18/Vendor Advisory
- https://www.mozilla.org/security/advisories/mfsa2017-19/Vendor Advisory
- https://www.mozilla.org/security/advisories/mfsa2017-20/Vendor Advisory
- http://www.securityfocus.com/bid/100196Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1039124Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2017:2456Third Party Advisory
- https://access.redhat.com/errata/RHSA-2017:2534Third Party Advisory
FAQ
What is CVE-2017-7800?
CVE-2017-7800 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A use-after-free vulnerability can occur in WebSockets when the object holding the connection is freed before the disconnection operation is finished. This results in an exploitable crash. This vulner...
How severe is CVE-2017-7800?
CVE-2017-7800 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-7800?
Check the references section above for vendor advisories and patch information. Affected products include: Debian Debian Linux, Redhat Enterprise Linux, Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Server, Redhat Enterprise Linux Server Aus.