CVE-2017-7805
Publication date 29 September 2017
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
During TLS 1.2 exchanges, handshake hashes are generated which point to a message buffer. This saved data is used for later messages but in some cases, the handshake transcript can exceed the space available in the current buffer, causing the allocation of a new buffer. This leaves a pointer pointing to the old, freed buffer, resulting in a use-after-free when handshake hashes are then calculated afterwards. This can result in a potentially exploitable crash. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
Status
Package | Ubuntu Release | Status |
---|---|---|
firefox | ||
18.04 LTS bionic |
Fixed 56.0+build6-0ubuntu1
|
|
16.04 LTS xenial |
Fixed 56.0+build6-0ubuntu0.16.04.1
|
|
14.04 LTS trusty |
Fixed 56.0+build6-0ubuntu0.14.04.1
|
|
nss | ||
18.04 LTS bionic |
Fixed 2:3.32-1ubuntu3
|
|
16.04 LTS xenial |
Fixed 2:3.28.4-0ubuntu0.16.04.3
|
|
14.04 LTS trusty |
Fixed 2:3.28.4-0ubuntu0.14.04.3
|
|
thunderbird | ||
18.04 LTS bionic |
Fixed 1:52.4.0+build1-0ubuntu2
|
|
16.04 LTS xenial |
Fixed 1:52.4.0+build1-0ubuntu0.16.04.2
|
|
14.04 LTS trusty |
Fixed 1:52.4.0+build1-0ubuntu0.14.04.2
|
Patch details
Package | Patch details |
---|---|
nss |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 · High |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-3436-1
- Thunderbird vulnerabilities
- 11 October 2017
- USN-3431-1
- NSS vulnerability
- 2 October 2017
- USN-3435-1
- Firefox vulnerabilities
- 2 October 2017