CVE-2017-7764

Characters from the "Canadian Syllabics" unicode block can be mixed with characters from other unicode blocks in the addressbar instead of being rendered as their raw "punycode" form, allowing for domain name spoofing attacks through character confusion. The current Unicode standard allows characters from "Aspirational Use Scripts" such as Canadian Syllabics to be mixed with Latin characters in the "moderately restrictive" IDN profile. We have changed Firefox behavior to match the upcoming Unicode version 10.0 which removes this category and treats them as "Limited Use Scripts.". This vulnerability affects Firefox < 54, Firefox ESR < 52.2, and Thunderbird < 52.2.
References
Link Resource
http://www.securityfocus.com/bid/99057 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1038689 Third Party Advisory VDB Entry
http://www.unicode.org/reports/tr31/tr31-26.html#Aspirational_Use_Scripts Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:1440 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:1561 Third Party Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=1364283 Exploit Issue Tracking Vendor Advisory
https://www.debian.org/security/2017/dsa-3881 Third Party Advisory
https://www.debian.org/security/2017/dsa-3918 Third Party Advisory
https://www.mozilla.org/security/advisories/mfsa2017-15/ Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2017-16/ Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2017-17/ Vendor Advisory
http://www.securityfocus.com/bid/99057 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1038689 Third Party Advisory VDB Entry
http://www.unicode.org/reports/tr31/tr31-26.html#Aspirational_Use_Scripts Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:1440 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:1561 Third Party Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=1364283 Exploit Issue Tracking Vendor Advisory
https://www.debian.org/security/2017/dsa-3881 Third Party Advisory
https://www.debian.org/security/2017/dsa-3918 Third Party Advisory
https://www.mozilla.org/security/advisories/mfsa2017-15/ Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2017-16/ Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2017-17/ Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2018-06-11 21:29

Updated : 2024-11-21 03:32


NVD link : CVE-2017-7764

Mitre link : CVE-2017-7764

CVE.ORG link : CVE-2017-7764


JSON object : View

Products Affected

debian

  • debian_linux

mozilla

  • firefox_esr
  • firefox
  • thunderbird
CWE
CWE-20

Improper Input Validation