Vulnerability Description
A buffer overflow occurs when drawing and validating elements with the ANGLE graphics library, used for WebGL content. This is due to an incorrect value being passed within the library during checks and results in a potentially exploitable crash. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Enterprise Linux Aus | 7.4 |
| Redhat | Enterprise Linux Desktop | 6.0 |
| Redhat | Enterprise Linux Eus | 7.4 |
| Redhat | Enterprise Linux Server | 6.0 |
| Redhat | Enterprise Linux Workstation | 6.0 |
| Debian | Debian Linux | 7.0 |
| Mozilla | Firefox | < 52.4.0 |
| Mozilla | Thunderbird | < 52.4.0 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/101053Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1039465Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2017:2831Third Party Advisory
- https://access.redhat.com/errata/RHSA-2017:2885Third Party Advisory
- https://bugzilla.mozilla.org/show_bug.cgi?id=1398381Issue Tracking
- https://lists.debian.org/debian-lts-announce/2017/11/msg00000.htmlMailing ListThird Party Advisory
- https://security.gentoo.org/glsa/201803-14Third Party Advisory
- https://www.debian.org/security/2017/dsa-3987Third Party Advisory
- https://www.debian.org/security/2017/dsa-4014Third Party Advisory
- https://www.mozilla.org/security/advisories/mfsa2017-21/Vendor Advisory
- https://www.mozilla.org/security/advisories/mfsa2017-22/Vendor Advisory
- https://www.mozilla.org/security/advisories/mfsa2017-23/Vendor Advisory
- http://www.securityfocus.com/bid/101053Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1039465Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2017:2831Third Party Advisory
FAQ
What is CVE-2017-7824?
CVE-2017-7824 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A buffer overflow occurs when drawing and validating elements with the ANGLE graphics library, used for WebGL content. This is due to an incorrect value being passed within the library during checks a...
How severe is CVE-2017-7824?
CVE-2017-7824 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-7824?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Enterprise Linux Aus, Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Eus, Redhat Enterprise Linux Server, Redhat Enterprise Linux Workstation.