The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of Mozilla Firefox

computer vulnerability bulletin CVE-2017-5753 CVE-2018-3693

Processors: memory reading via Spectre Bounds Check

Synthesis of the vulnerability

A local attacker can access to the kernel memory, in order to read sensitive information.
Impacted products: SNS, iOS by Apple, Mac OS X, Blue Coat CAS, Cisco ASR, Cisco Catalyst, Nexus by Cisco, NX-OS, Cisco Router, Cisco UCS, XenServer, Debian, ConnectPort TSx, Avamar, ExtremeXOS, Summit, BIG-IP Hardware, TMOS, Fedora, FortiAnalyzer, FortiGate, FortiManager, FortiOS, FreeBSD, Android OS, Chrome, AIX, IBM i, QRadar SIEM, Juniper J-Series, Junos OS, Junos Space, NSMXpress, Linux, McAfee Email Gateway, McAfee NSM, McAfee NTBA, McAfee Web Gateway, Meinberg NTP Server, Edge, IE, SQL Server, Windows 10, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 2016, Windows 7, Windows 8, Windows (platform) ~ not comprehensive, Windows RT, Firefox, openSUSE Leap, Opera, Oracle Communications, Solaris, RealPresence Collaboration Server, RealPresence Distributed Media Application, RealPresence Resource Manager, RHEL, SIMATIC, Sonus SBC, SUSE Linux Enterprise Desktop, SLES, Symantec Content Analysis, Synology DSM, Synology DS***, Synology RS***, Ubuntu, Unix (platform) ~ not comprehensive, ESXi, vCenter Server, VMware vSphere, VMware vSphere Hypervisor, VMware Workstation, Xen.
Severity: 1/4.
Consequences: data reading.
Provenance: user shell.
Number of vulnerabilities in this bulletin: 2.
Creation date: 05/01/2018.
Revision date: 21/02/2018.
Identifiers: 2016636, 519675, ADV180002, bulletinjan2018, bulletinjul2018, CERTFR-2018-AVI-004, CERTFR-2018-AVI-005, CERTFR-2018-AVI-006, CERTFR-2018-AVI-008, CERTFR-2018-AVI-009, CERTFR-2018-AVI-012, CERTFR-2018-AVI-013, CERTFR-2018-AVI-014, CERTFR-2018-AVI-016, CERTFR-2018-AVI-027, CERTFR-2018-AVI-029, CERTFR-2018-AVI-032, CERTFR-2018-AVI-048, CERTFR-2018-AVI-049, CERTFR-2018-AVI-077, CERTFR-2018-AVI-079, CERTFR-2018-AVI-094, CERTFR-2018-AVI-114, CERTFR-2018-AVI-124, CERTFR-2018-AVI-134, CERTFR-2018-AVI-208, CERTFR-2018-AVI-256, CERTFR-2018-AVI-365, CERTFR-2018-AVI-584, CERTFR-2019-AVI-042, CERTFR-2019-AVI-052, CERTFR-2019-AVI-131, CERTFR-2019-AVI-242, cisco-sa-20180104-cpusidechannel, cpuapr2018, cpuapr2019, CTX231390, CTX231399, CVE-2017-5753, CVE-2018-3693, DLA-1422-1, DLA-1422-2, DLA-1423-1, DLA-1424-1, DLA-1434-1, DLA-1731-1, DLA-1731-2, DSA-2018-049, DSA-4187-1, DSA-4188-1, FEDORA-2018-21a7ad920c, FEDORA-2018-276558ff6f, FEDORA-2018-6b319763ab, FEDORA-2018-7e17849364, FEDORA-2018-e6fe35524d, FEDORA-2018-fb582aabcc, FG-IR-18-002, HT208397, HT208401, ibm10742755, INTEL-OSS-10002, JSA10842, JSA10873, JSA10917, K91229003, MBGSA-1801, MFSA-2018-01, N1022433, nas8N1022433, openSUSE-SU-2018:0022-1, openSUSE-SU-2018:0023-1, openSUSE-SU-2018:0326-1, openSUSE-SU-2018:0459-1, openSUSE-SU-2018:1623-1, openSUSE-SU-2018:2119-1, RHSA-2018:0007-01, RHSA-2018:0008-01, RHSA-2018:0009-01, RHSA-2018:0010-01, RHSA-2018:0011-01, RHSA-2018:0012-01, RHSA-2018:0013-01, RHSA-2018:0014-01, RHSA-2018:0015-01, RHSA-2018:0016-01, RHSA-2018:0017-01, RHSA-2018:0018-01, RHSA-2018:0020-01, RHSA-2018:0021-01, RHSA-2018:0022-01, RHSA-2018:0023-01, RHSA-2018:0024-01, RHSA-2018:0025-01, RHSA-2018:0026-01, RHSA-2018:0027-01, RHSA-2018:0028-01, RHSA-2018:0029-01, RHSA-2018:0030-01, RHSA-2018:0031-01, RHSA-2018:0032-01, RHSA-2018:0034-01, RHSA-2018:0035-01, RHSA-2018:0036-01, RHSA-2018:0037-01, RHSA-2018:0038-01, RHSA-2018:0039-01, RHSA-2018:0040-01, RHSA-2018:0053-01, RHSA-2018:0093-01, RHSA-2018:0094-01, RHSA-2018:0103-01, RHSA-2018:0104-01, RHSA-2018:0105-01, RHSA-2018:0106-01, RHSA-2018:0107-01, RHSA-2018:0108-01, RHSA-2018:0109-01, RHSA-2018:0110-01, RHSA-2018:0111-01, RHSA-2018:0112-01, RHSA-2018:0182-01, RHSA-2018:0292-01, RHSA-2018:0464-01, RHSA-2018:0496-01, RHSA-2018:0512-01, RHSA-2018:1129-01, RHSA-2018:1196-01, SA161, SB10226, Spectre, spectre_meltdown_advisory, SSA-168644, SSA-505225, STORM-2018-001, SUSE-SU-2018:0011-1, SUSE-SU-2018:0012-1, SUSE-SU-2018:0031-1, SUSE-SU-2018:0040-1, SUSE-SU-2018:0069-1, SUSE-SU-2018:0113-1, SUSE-SU-2018:0114-1, SUSE-SU-2018:0115-1, SUSE-SU-2018:0131-1, SUSE-SU-2018:0171-1, SUSE-SU-2018:0219-1, SUSE-SU-2018:0438-1, SUSE-SU-2018:0472-1, SUSE-SU-2018:0601-1, SUSE-SU-2018:0609-1, SUSE-SU-2018:0638-1, SUSE-SU-2018:0678-1, SUSE-SU-2018:0909-1, SUSE-SU-2018:1368-1, SUSE-SU-2018:1376-1, SUSE-SU-2018:1603-1, SUSE-SU-2018:1658-1, SUSE-SU-2018:1699-1, SUSE-SU-2018:2150-1, SUSE-SU-2018:2528-1, SUSE-SU-2019:0222-1, SUSE-SU-2019:0765-1, SUSE-SU-2019:1550-1, Synology-SA-18:01, USN-3516-1, USN-3521-1, USN-3530-1, USN-3541-1, USN-3541-2, USN-3542-1, USN-3542-2, USN-3549-1, USN-3580-1, USN-3597-1, USN-3597-2, VIGILANCE-VUL-24948, VMSA-2018-0002, VMSA-2018-0004, VMSA-2018-0004.2, VMSA-2018-0004.3, VMSA-2018-0007, VN-2018-001, VN-2018-002, VU#584653, XSA-254.

Description of the vulnerability

A local attacker can monitor the performances of its process, in order to get information about the data used for computing by the processor.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability note CVE-2017-5715

Processors: memory reading via Spectre Branch Target

Synthesis of the vulnerability

A local attacker can monitor the performances of its process, in order to get information about the data used for computing by the processor.
Impacted products: SNS, iOS by Apple, Mac OS X, Blue Coat CAS, Cisco ASR, Cisco Catalyst, Nexus by Cisco, NX-OS, Cisco Router, Cisco UCS, XenServer, Debian, ConnectPort TSx, Avamar, ExtremeXOS, Summit, BIG-IP Hardware, TMOS, Fedora, FortiAnalyzer, FortiGate, FortiManager, FortiOS, FreeBSD, Android OS, Chrome, AIX, IBM i, QRadar SIEM, Juniper J-Series, Junos OS, Junos Space, NSMXpress, Linux, McAfee Email Gateway, McAfee NSM, McAfee NTBA, McAfee Web Gateway, Meinberg NTP Server, Edge, IE, SQL Server, Windows 10, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 2016, Windows 7, Windows 8, Windows (platform) ~ not comprehensive, Windows RT, Firefox, openSUSE Leap, Opera, Oracle Communications, WebLogic, pfSense, RealPresence Collaboration Server, RealPresence Distributed Media Application, RealPresence Resource Manager, RHEL, SIMATIC, Slackware, Sonus SBC, SUSE Linux Enterprise Desktop, SLES, Symantec Content Analysis, Synology DSM, Synology DS***, Synology RS***, Ubuntu, Unix (platform) ~ not comprehensive, ESXi, VMware vSphere, VMware vSphere Hypervisor, VMware Workstation, Xen.
Severity: 1/4.
Consequences: data reading.
Provenance: user shell.
Creation date: 05/01/2018.
Revision date: 07/02/2018.
Identifiers: 2016636, 519675, ADV180002, CERTFR-2018-AVI-004, CERTFR-2018-AVI-005, CERTFR-2018-AVI-006, CERTFR-2018-AVI-008, CERTFR-2018-AVI-009, CERTFR-2018-AVI-012, CERTFR-2018-AVI-013, CERTFR-2018-AVI-014, CERTFR-2018-AVI-016, CERTFR-2018-AVI-028, CERTFR-2018-AVI-029, CERTFR-2018-AVI-030, CERTFR-2018-AVI-032, CERTFR-2018-AVI-040, CERTFR-2018-AVI-048, CERTFR-2018-AVI-049, CERTFR-2018-AVI-075, CERTFR-2018-AVI-079, CERTFR-2018-AVI-080, CERTFR-2018-AVI-083, CERTFR-2018-AVI-094, CERTFR-2018-AVI-104, CERTFR-2018-AVI-118, CERTFR-2018-AVI-119, CERTFR-2018-AVI-124, CERTFR-2018-AVI-134, CERTFR-2018-AVI-161, CERTFR-2018-AVI-170, CERTFR-2018-AVI-196, CERTFR-2018-AVI-206, CERTFR-2018-AVI-208, CERTFR-2018-AVI-256, CERTFR-2019-AVI-242, cisco-sa-20180104-cpusidechannel, cpujul2019, CTX231390, CTX231399, CVE-2017-5715, DLA-1349-1, DLA-1362-1, DLA-1369-1, DLA-1422-1, DLA-1422-2, DLA-1497-1, DLA-1506-1, DSA-2018-049, DSA-4120-1, DSA-4120-2, DSA-4179-1, DSA-4187-1, DSA-4188-1, DSA-4213-1, FEDORA-2018-21a7ad920c, FEDORA-2018-276558ff6f, FEDORA-2018-6b319763ab, FEDORA-2018-7e17849364, FEDORA-2018-e6fe35524d, FEDORA-2018-fb582aabcc, FG-IR-18-002, FreeBSD-SA-18:03.speculative_execution, HT208397, HT208401, JSA10842, JSA10873, K91229003, LSN-0035-1, MBGSA-1801, MFSA-2018-01, N1022433, nas8N1022433, openSUSE-SU-2018:0013-1, openSUSE-SU-2018:0022-1, openSUSE-SU-2018:0023-1, openSUSE-SU-2018:0026-1, openSUSE-SU-2018:0030-1, openSUSE-SU-2018:0059-1, openSUSE-SU-2018:0066-1, openSUSE-SU-2018:0187-1, openSUSE-SU-2018:0326-1, openSUSE-SU-2018:0408-1, openSUSE-SU-2018:0459-1, openSUSE-SU-2018:0710-1, openSUSE-SU-2018:0745-1, openSUSE-SU-2018:0780-1, openSUSE-SU-2018:0939-1, openSUSE-SU-2018:1502-1, openSUSE-SU-2018:1623-1, openSUSE-SU-2018:1631-1, openSUSE-SU-2018:2119-1, openSUSE-SU-2018:2237-1, openSUSE-SU-2018:2524-1, RHSA-2018:0007-01, RHSA-2018:0008-01, RHSA-2018:0009-01, RHSA-2018:0010-01, RHSA-2018:0011-01, RHSA-2018:0012-01, RHSA-2018:0013-01, RHSA-2018:0014-01, RHSA-2018:0015-01, RHSA-2018:0016-01, RHSA-2018:0017-01, RHSA-2018:0018-01, RHSA-2018:0020-01, RHSA-2018:0021-01, RHSA-2018:0022-01, RHSA-2018:0023-01, RHSA-2018:0024-01, RHSA-2018:0025-01, RHSA-2018:0026-01, RHSA-2018:0027-01, RHSA-2018:0028-01, RHSA-2018:0029-01, RHSA-2018:0030-01, RHSA-2018:0031-01, RHSA-2018:0032-01, RHSA-2018:0034-01, RHSA-2018:0035-01, RHSA-2018:0036-01, RHSA-2018:0037-01, RHSA-2018:0038-01, RHSA-2018:0039-01, RHSA-2018:0040-01, RHSA-2018:0053-01, RHSA-2018:0093-01, RHSA-2018:0094-01, RHSA-2018:0103-01, RHSA-2018:0104-01, RHSA-2018:0105-01, RHSA-2018:0106-01, RHSA-2018:0107-01, RHSA-2018:0108-01, RHSA-2018:0109-01, RHSA-2018:0110-01, RHSA-2018:0111-01, RHSA-2018:0112-01, RHSA-2018:0182-01, RHSA-2018:0292-01, RHSA-2018:0496-01, RHSA-2018:0512-01, RHSA-2018:1129-01, RHSA-2018:1196-01, SA161, SB10226, Spectre, spectre_meltdown_advisory, SSA-168644, SSA:2018-016-01, SSA:2018-037-01, STORM-2018-001, SUSE-SU-2018:0006-1, SUSE-SU-2018:0007-1, SUSE-SU-2018:0008-1, SUSE-SU-2018:0009-1, SUSE-SU-2018:0011-1, SUSE-SU-2018:0012-1, SUSE-SU-2018:0019-1, SUSE-SU-2018:0020-1, SUSE-SU-2018:0031-1, SUSE-SU-2018:0036-1, SUSE-SU-2018:0039-1, SUSE-SU-2018:0040-1, SUSE-SU-2018:0041-1, SUSE-SU-2018:0051-1, SUSE-SU-2018:0056-1, SUSE-SU-2018:0067-1, SUSE-SU-2018:0068-1, SUSE-SU-2018:0069-1, SUSE-SU-2018:0113-1, SUSE-SU-2018:0114-1, SUSE-SU-2018:0115-1, SUSE-SU-2018:0131-1, SUSE-SU-2018:0171-1, SUSE-SU-2018:0219-1, SUSE-SU-2018:0383-1, SUSE-SU-2018:0416-1, SUSE-SU-2018:0437-1, SUSE-SU-2018:0438-1, SUSE-SU-2018:0472-1, SUSE-SU-2018:0525-1, SUSE-SU-2018:0555-1, SUSE-SU-2018:0601-1, SUSE-SU-2018:0609-1, SUSE-SU-2018:0638-1, SUSE-SU-2018:0660-1, SUSE-SU-2018:0678-1, SUSE-SU-2018:0705-1, SUSE-SU-2018:0708-1, SUSE-SU-2018:0762-1, SUSE-SU-2018:0831-1, SUSE-SU-2018:0838-1, SUSE-SU-2018:0841-1, SUSE-SU-2018:0861-1, SUSE-SU-2018:0909-1, SUSE-SU-2018:0920-1, SUSE-SU-2018:0986-1, SUSE-SU-2018:1077-1, SUSE-SU-2018:1080-1, SUSE-SU-2018:1308-1, SUSE-SU-2018:1363-1, SUSE-SU-2018:1368-1, SUSE-SU-2018:1376-1, SUSE-SU-2018:1386-1, SUSE-SU-2018:1498-1, SUSE-SU-2018:1503-1, SUSE-SU-2018:1567-1, SUSE-SU-2018:1570-1, SUSE-SU-2018:1571-1, SUSE-SU-2018:1603-1, SUSE-SU-2018:1658-1, SUSE-SU-2018:1661-1, SUSE-SU-2018:1699-1, SUSE-SU-2018:1759-1, SUSE-SU-2018:1784-1, SUSE-SU-2018:2082-1, SUSE-SU-2018:2141-1, SUSE-SU-2018:2189-1, SUSE-SU-2018:2528-1, SUSE-SU-2018:2631-1, SUSE-SU-2019:13999-1, Synology-SA-18:01, USN-3516-1, USN-3530-1, USN-3531-1, USN-3531-2, USN-3531-3, USN-3541-1, USN-3541-2, USN-3549-1, USN-3560-1, USN-3561-1, USN-3580-1, USN-3581-1, USN-3581-2, USN-3581-3, USN-3582-1, USN-3582-2, USN-3594-1, USN-3597-1, USN-3597-2, USN-3620-1, USN-3620-2, USN-3690-1, USN-3690-2, VIGILANCE-VUL-24949, VMSA-2018-0002, VMSA-2018-0004, VMSA-2018-0004.2, VMSA-2018-0004.3, VN-2018-001, VN-2018-002, VU#584653, XSA-254.

Description of the vulnerability

A local attacker can monitor the performances of its process, in order to get information about the data used for computing by the processor.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2018-5124

Mozilla Firefox: code execution via the user interface

Synthesis of the vulnerability

An attacker can use a vulnerability in the user interface of Mozilla Firefox, in order to run script with high privileges.
Impacted products: Fedora, Firefox, Ubuntu.
Severity: 3/4.
Consequences: administrator access/rights, privileged access/rights, user access/rights.
Provenance: document.
Creation date: 30/01/2018.
Identifiers: 1432966, CERTFR-2018-AVI-062, CVE-2018-5124, FEDORA-2018-79db828bff, FEDORA-2018-d9706e9f1f, MFSA-2018-05, USN-3552-1, VIGILANCE-VUL-25177.

Description of the vulnerability

An attacker can use a vulnerability in the user interface of Mozilla Firefox, in order to run script with high privileges.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability CVE-2017-7845

Firefox, Thunderbird: buffer overflow via ANGLE Library Using Direct 3D 9

Synthesis of the vulnerability

An attacker can generate a buffer overflow via ANGLE Library Using Direct 3D 9 of Firefox/Thunderbird, in order to trigger a denial of service, and possibly to run code.
Impacted products: Fedora, Firefox, Thunderbird.
Severity: 4/4.
Consequences: user access/rights, denial of service on service, denial of service on client.
Provenance: document.
Creation date: 08/12/2017.
Identifiers: CERTFR-2017-AVI-455, CVE-2017-7845, FEDORA-2018-16a76da6cc, FEDORA-2018-3ec87df5ba, FEDORA-2018-4e65ec8cc4, FEDORA-2018-e1539d9bc6, MFSA-2017-28, MFSA-2017-29, MFSA-2017-30, VIGILANCE-VUL-24705.

Description of the vulnerability

An attacker can generate a buffer overflow via ANGLE Library Using Direct 3D 9 of Firefox/Thunderbird, in order to trigger a denial of service, and possibly to run code.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability note CVE-2017-7843 CVE-2017-7844

Mozilla Firefox: two vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Mozilla Firefox.
Impacted products: Debian, Fedora, Firefox, openSUSE Leap, Solaris, RHEL.
Severity: 2/4.
Consequences: data reading.
Provenance: document.
Number of vulnerabilities in this bulletin: 2.
Creation date: 05/12/2017.
Identifiers: bulletinjan2018, CERTFR-2017-AVI-446, CERTFR-2017-AVI-455, CVE-2017-7843, CVE-2017-7844, DLA-1202-1, DSA-4062-1, FEDORA-2017-1be05999bb, FEDORA-2017-2c15e19fb5, FEDORA-2017-bfd2d4afce, FEDORA-2018-16a76da6cc, FEDORA-2018-3ec87df5ba, FEDORA-2018-4e65ec8cc4, FEDORA-2018-e1539d9bc6, MFSA-2017-28, openSUSE-SU-2017:3272-1, RHSA-2017:3382-01, VIGILANCE-VUL-24649.

Description of the vulnerability

An attacker can use several vulnerabilities of Mozilla Firefox.
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2017-7826 CVE-2017-7827 CVE-2017-7828

Mozilla Firefox, Thunderbird: multiple vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Mozilla Firefox/Thunderbird.
Impacted products: Debian, Fedora, Firefox, Thunderbird, openSUSE Leap, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 4/4.
Consequences: user access/rights, data reading, data creation/edition, denial of service on client.
Provenance: document.
Number of vulnerabilities in this bulletin: 15.
Creation date: 14/11/2017.
Identifiers: CERTFR-2017-AVI-412, CERTFR-2017-AVI-431, CVE-2017-7826, CVE-2017-7827, CVE-2017-7828, CVE-2017-7830, CVE-2017-7831, CVE-2017-7832, CVE-2017-7833, CVE-2017-7834, CVE-2017-7835, CVE-2017-7836, CVE-2017-7837, CVE-2017-7838, CVE-2017-7839, CVE-2017-7840, CVE-2017-7842, DLA-1172-1, DLA-1199-1, DSA-4035-1, DSA-4061-1, DSA-4075-1, FEDORA-2017-463cb2af78, FEDORA-2017-7d33609b3d, FEDORA-2017-9a6569beb6, FEDORA-2017-b410301903, FEDORA-2017-e1e3fbcd3c, MFSA-2017-24, MFSA-2017-25, MFSA-2017-26, openSUSE-SU-2017:3027-1, openSUSE-SU-2017:3108-1, openSUSE-SU-2017:3110-1, RHSA-2017:3247-01, RHSA-2017:3372-01, SSA:2017-320-02, SUSE-SU-2017:3213-1, SUSE-SU-2017:3233-1, USN-3477-1, USN-3477-2, USN-3477-3, USN-3477-4, USN-3490-1, USN-3688-1, VIGILANCE-VUL-24431.

Description of the vulnerability

An attacker can use several vulnerabilities of Mozilla Firefox/Thunderbird.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert CVE-2017-7805

Mozilla NSS: use after free via Verifying Client Authentication

Synthesis of the vulnerability

An attacker can force the usage of a freed memory area via Verifying Client Authentication of Mozilla NSS, in order to trigger a denial of service, and possibly to run code.
Impacted products: Debian, Fedora, Firefox, NSS, SeaMonkey, openSUSE Leap, Oracle Communications, Oracle Fusion Middleware, Oracle GlassFish Server, Oracle Identity Management, Solaris, Tuxedo, Oracle Virtual Directory, WebLogic, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 4/4.
Consequences: user access/rights, denial of service on service, denial of service on client.
Provenance: document.
Creation date: 29/09/2017.
Identifiers: bulletinoct2017, cpuapr2018, cpuoct2018, CVE-2017-7805, DLA-1118-1, DLA-1138-1, DSA-3987-1, DSA-3998-1, FEDORA-2017-2e7badfe67, FEDORA-2017-6e2071419d, MFSA-2017-21, MFSA-2017-22, openSUSE-SU-2017:2615-1, openSUSE-SU-2017:2707-1, openSUSE-SU-2017:2710-1, RHSA-2017:2831-01, RHSA-2017:2832-01, SSA:2017-271-01, SUSE-SU-2017:2688-1, SUSE-SU-2017:2872-1, SUSE-SU-2017:2872-2, USN-3431-1, USN-3435-1, USN-3435-2, USN-3436-1, VIGILANCE-VUL-23976.

Description of the vulnerability

An attacker can force the usage of a freed memory area via Verifying Client Authentication of Mozilla NSS, in order to trigger a denial of service, and possibly to run code.
Full Vigil@nce bulletin... (Free trial)

vulnerability CVE-2017-7793 CVE-2017-7810 CVE-2017-7811

Firefox, Thunderbird: multiple vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Firefox and Thunderbird.
Impacted products: Debian, Fedora, Firefox, SeaMonkey, Thunderbird, openSUSE Leap, Solaris, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 4/4.
Consequences: user access/rights, data reading, data creation/edition, denial of service on client.
Provenance: document.
Number of vulnerabilities in this bulletin: 17.
Creation date: 29/09/2017.
Identifiers: bulletinoct2017, CERTFR-2017-AVI-327, CERTFR-2017-AVI-340, CVE-2017-7793, CVE-2017-7810, CVE-2017-7811, CVE-2017-7812, CVE-2017-7813, CVE-2017-7814, CVE-2017-7815, CVE-2017-7816, CVE-2017-7817, CVE-2017-7818, CVE-2017-7819, CVE-2017-7820, CVE-2017-7821, CVE-2017-7822, CVE-2017-7823, CVE-2017-7824, CVE-2017-7825, DLA-1118-1, DLA-1153-1, DSA-3987-1, DSA-4014-1, FEDORA-2017-2e7badfe67, FEDORA-2017-6967efb3f0, FEDORA-2017-6e2071419d, FEDORA-2017-730e299c49, FEDORA-2017-845c543ea4, MFSA-2017-21, MFSA-2017-22, MFSA-2017-23, openSUSE-SU-2017:2615-1, openSUSE-SU-2017:2707-1, openSUSE-SU-2017:2710-1, RHSA-2017:2831-01, RHSA-2017:2885-01, SSA:2017-271-01, SUSE-SU-2017:2688-1, SUSE-SU-2017:2872-1, SUSE-SU-2017:2872-2, USN-3435-1, USN-3435-2, USN-3436-1, USN-3688-1, VIGILANCE-VUL-23970.

Description of the vulnerability

An attacker can use several vulnerabilities of Firefox and Thunderbird.
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2017-7753 CVE-2017-7779 CVE-2017-7780

Firefox, Thunderbird: multiple vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Firefox and Thunderbird.
Impacted products: Debian, Fedora, Firefox, SeaMonkey, Thunderbird, openSUSE Leap, Solaris, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 4/4.
Consequences: user access/rights, data reading, data creation/edition, denial of service on client.
Provenance: document.
Number of vulnerabilities in this bulletin: 29.
Creation date: 09/08/2017.
Identifiers: bulletinjul2017, CERTFR-2017-AVI-256, CERTFR-2017-AVI-271, CVE-2017-7753, CVE-2017-7779, CVE-2017-7780, CVE-2017-7781, CVE-2017-7782, CVE-2017-7783, CVE-2017-7784, CVE-2017-7785, CVE-2017-7786, CVE-2017-7787, CVE-2017-7788, CVE-2017-7789, CVE-2017-7790, CVE-2017-7791, CVE-2017-7792, CVE-2017-7794, CVE-2017-7796, CVE-2017-7797, CVE-2017-7798, CVE-2017-7799, CVE-2017-7800, CVE-2017-7801, CVE-2017-7802, CVE-2017-7803, CVE-2017-7804, CVE-2017-7806, CVE-2017-7807, CVE-2017-7808, CVE-2017-7809, DLA-1053-1, DLA-1087-1, DLA-1087-2, DSA-3928-1, DSA-3928-2, DSA-3968-1, FEDORA-2017-0dfa70ae35, FEDORA-2017-3df020e756, FEDORA-2017-bdd0b565ef, MFSA-2017-18, MFSA-2017-19, MFSA-2017-20, openSUSE-SU-2017:2151-1, openSUSE-SU-2017:2209-1, RHSA-2017:2456-01, RHSA-2017:2534-01, SSA:2017-221-02, SUSE-SU-2017:2302-1, SUSE-SU-2017:2589-1, USN-3391-1, USN-3391-2, USN-3391-3, USN-3416-1, VIGILANCE-VUL-23484.

Description of the vulnerability

An attacker can use several vulnerabilities of Firefox and Thunderbird.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability note CVE-2017-5470 CVE-2017-5471 CVE-2017-5472

Mozilla Firefox, Thunderbird: multiple vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Mozilla Firefox and Thunderbird.
Impacted products: Debian, Fedora, Firefox, SeaMonkey, Thunderbird, openSUSE Leap, Solaris, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 4/4.
Consequences: privileged access/rights, client access/rights, data reading, data creation/edition, denial of service on client.
Provenance: document.
Number of vulnerabilities in this bulletin: 31.
Creation date: 14/06/2017.
Identifiers: bulletinjul2017, CERTFR-2017-AVI-174, CERTFR-2017-AVI-182, CVE-2017-5470, CVE-2017-5471, CVE-2017-5472, CVE-2017-7749, CVE-2017-7750, CVE-2017-7751, CVE-2017-7752, CVE-2017-7754, CVE-2017-7755, CVE-2017-7756, CVE-2017-7757, CVE-2017-7758, CVE-2017-7759, CVE-2017-7760, CVE-2017-7761, CVE-2017-7762, CVE-2017-7763, CVE-2017-7764, CVE-2017-7765, CVE-2017-7766, CVE-2017-7767, CVE-2017-7768, CVE-2017-7770, CVE-2017-7771, CVE-2017-7772, CVE-2017-7773, CVE-2017-7774, CVE-2017-7775-REJECT, CVE-2017-7776, CVE-2017-7777, CVE-2017-7778, DLA-1007-1, DLA-1013-1, DLA-1086-1, DLA-991-1, DSA-3881-1, DSA-3894-1, DSA-3918-1, DSA-3921-1, FEDORA-2017-1dfdb04d62, FEDORA-2017-1f016389a7, FEDORA-2017-391ac5097a, FEDORA-2017-74999f2a23, FEDORA-2017-87aa9db27f, MFSA-2017-15, MFSA-2017-16, MFSA-2017-17, openSUSE-SU-2017:1579-1, openSUSE-SU-2017:1620-1, RHSA-2017:1440-01, RHSA-2017:1561-01, RHSA-2017:1793-01, RHSA-2018:2112-01, RHSA-2018:2113-01, SSA:2017-165-02, SUSE-SU-2017:1669-1, SUSE-SU-2017:2235-1, USN-3315-1, USN-3321-1, USN-3398-1, VIGILANCE-VUL-22969.

Description of the vulnerability

An attacker can use several vulnerabilities of Mozilla Firefox and Thunderbird.
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about Mozilla Firefox: