CVE-2017-7820
https://notcve.org/view.php?id=CVE-2017-7820
The "instanceof" operator can bypass the Xray wrapper mechanism. When called on web content from the browser itself or an extension the web content can provide its own result for that operator, possibly tricking the browser or extension into mishandling the element. This vulnerability affects Firefox < 56. El operador "instanceof" puede omitir el mecanismo del wrapper Xray. Cuando se le llama en un contenido web desde el propio navegador o una extensión, el contenido web puede proporcionar su propio resultado para ese operador, pudiendo engañar al navegador o extensión para que manipule erróneamente el elemento. • http://www.securityfocus.com/bid/101057 http://www.securitytracker.com/id/1039465 https://bugzilla.mozilla.org/show_bug.cgi?id=1378207 https://www.mozilla.org/security/advisories/mfsa2017-21 •
CVE-2017-7821
https://notcve.org/view.php?id=CVE-2017-7821
A vulnerability where WebExtensions can download and attempt to open a file of some non-executable file types. This can be triggered without specific user interaction for the file download and open actions. This could be used to trigger known vulnerabilities in the programs that handle those document types. This vulnerability affects Firefox < 56. Una vulnerabilidad en el que WebExtensions puede descargar e intentar abrir un archivo de tipos que no sean ejecutables. • http://www.securityfocus.com/bid/101057 http://www.securitytracker.com/id/1039465 https://bugzilla.mozilla.org/show_bug.cgi?id=1346515 https://www.mozilla.org/security/advisories/mfsa2017-21 • CWE-732: Incorrect Permission Assignment for Critical Resource •
CVE-2017-7812
https://notcve.org/view.php?id=CVE-2017-7812
If web content on a page is dragged onto portions of the browser UI, such as the tab bar, links can be opened that otherwise would not be allowed to open. This can allow malicious web content to open a locally stored file through "file:" URLs. This vulnerability affects Firefox < 56. Si el contenido web en una página se arrastra a porciones de la interfaz de usuario del navegador como una barra de pestañas, los enlaces se pueden abrir, algo que de otra manera no se podrían abrir. Esto puede permitir que un contenido web malicioso abra un archivo almacenado localmente mediante URL "file:". • http://www.securityfocus.com/bid/101057 http://www.securitytracker.com/id/1039465 https://bugzilla.mozilla.org/show_bug.cgi?id=1379842 https://www.mozilla.org/security/advisories/mfsa2017-21 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2017-7805 – nss: Potential use-after-free in TLS 1.2 server when verifying client authentication
https://notcve.org/view.php?id=CVE-2017-7805
During TLS 1.2 exchanges, handshake hashes are generated which point to a message buffer. This saved data is used for later messages but in some cases, the handshake transcript can exceed the space available in the current buffer, causing the allocation of a new buffer. This leaves a pointer pointing to the old, freed buffer, resulting in a use-after-free when handshake hashes are then calculated afterwards. This can result in a potentially exploitable crash. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4. • http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/101059 http://www.securitytracker.com/id/1039465 https://access.redhat.com/errata/RHSA-2017:2832 https://bugzilla.mozilla.org/show_bug.cgi?id=1377618 https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html https://security.gentoo.org/glsa/201803-14 https://www.debian.org/security/2017/dsa-3987 https://www.debian.org/security/2017/dsa-3998 https://www.debia • CWE-416: Use After Free •
CVE-2017-7819 – Mozilla: Use-after-free while resizing images in design mode (MFSA 2017-22)
https://notcve.org/view.php?id=CVE-2017-7819
A use-after-free vulnerability can occur in design mode when image objects are resized if objects referenced during the resizing have been freed from memory. This results in a potentially exploitable crash. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4. Puede ocurrir una vulnerabilidad de uso de memoria previamente liberada cuando los objetos imagen se redimensionan si los objetos referenciados durante el redimensionamiento se han liberado de la memoria. Esto resulta en un cierre inesperado explotable. • http://www.securityfocus.com/bid/101055 http://www.securitytracker.com/id/1039465 https://access.redhat.com/errata/RHSA-2017:2831 https://access.redhat.com/errata/RHSA-2017:2885 https://bugzilla.mozilla.org/show_bug.cgi?id=1380292 https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html https://security.gentoo.org/glsa/201803-14 https://www.debian.org/security/2017/dsa-3987 https://www.debian.org/security/2017/dsa-4014 https://www.mozilla.org/security/advisor • CWE-416: Use After Free •