CVE-2017-7814

File downloads encoded with "blob:" and "data:" URL elements bypassed normal file download checks though the Phishing and Malware Protection feature and its block lists of suspicious sites and files. This would allow malicious sites to lure users into downloading executables that would otherwise be detected as suspicious. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
References
Link Resource
http://www.securityfocus.com/bid/101059 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1039465 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2017:2831 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2885 Third Party Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=1376036 Issue Tracking Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html Third Party Advisory
https://security.gentoo.org/glsa/201803-14 Third Party Advisory
https://www.debian.org/security/2017/dsa-3987 Third Party Advisory
https://www.debian.org/security/2017/dsa-4014 Third Party Advisory
https://www.mozilla.org/security/advisories/mfsa2017-21/ Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2017-22/ Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2017-23/ Vendor Advisory
http://www.securityfocus.com/bid/101059 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1039465 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2017:2831 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2885 Third Party Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=1376036 Issue Tracking Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html Third Party Advisory
https://security.gentoo.org/glsa/201803-14 Third Party Advisory
https://www.debian.org/security/2017/dsa-3987 Third Party Advisory
https://www.debian.org/security/2017/dsa-4014 Third Party Advisory
https://www.mozilla.org/security/advisories/mfsa2017-21/ Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2017-22/ Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2017-23/ Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2018-06-11 21:29

Updated : 2024-11-21 03:32


NVD link : CVE-2017-7814

Mitre link : CVE-2017-7814

CVE.ORG link : CVE-2017-7814


JSON object : View

Products Affected

redhat

  • enterprise_linux_workstation
  • enterprise_linux_server_aus
  • enterprise_linux_server_eus
  • enterprise_linux_desktop
  • enterprise_linux_server

mozilla

  • firefox
  • thunderbird
  • firefox_esr

debian

  • debian_linux
CWE
CWE-20

Improper Input Validation