Vulnerability Description
Inside the JavaScript parser, a cast of an integer to a narrower type can result in data read from outside the buffer being parsed. This usually results in a non-exploitable crash, but can leak a limited amount of information from memory if it matches JavaScript identifier syntax. This vulnerability affects Firefox < 56.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mozilla | Firefox | <= 55.0.3 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/101057Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1039465Third Party AdvisoryVDB Entry
- https://bugzilla.mozilla.org/show_bug.cgi?id=1383951ExploitIssue Tracking
- https://www.mozilla.org/security/advisories/mfsa2017-21/Vendor Advisory
- http://www.securityfocus.com/bid/101057Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1039465Third Party AdvisoryVDB Entry
- https://bugzilla.mozilla.org/show_bug.cgi?id=1383951ExploitIssue Tracking
- https://www.mozilla.org/security/advisories/mfsa2017-21/Vendor Advisory
FAQ
What is CVE-2017-7813?
CVE-2017-7813 is a vulnerability with a CVSS score of 8.2 (HIGH). Inside the JavaScript parser, a cast of an integer to a narrower type can result in data read from outside the buffer being parsed. This usually results in a non-exploitable crash, but can leak a limi...
How severe is CVE-2017-7813?
CVE-2017-7813 has been rated HIGH with a CVSS base score of 8.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-7813?
Check the references section above for vendor advisories and patch information. Affected products include: Mozilla Firefox.