CVE-2017-7764
Mozilla: Domain spoofing with combination of Canadian Syllabics and other unicode blocks (MFSA 2017-16)
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Characters from the "Canadian Syllabics" unicode block can be mixed with characters from other unicode blocks in the addressbar instead of being rendered as their raw "punycode" form, allowing for domain name spoofing attacks through character confusion. The current Unicode standard allows characters from "Aspirational Use Scripts" such as Canadian Syllabics to be mixed with Latin characters in the "moderately restrictive" IDN profile. We have changed Firefox behavior to match the upcoming Unicode version 10.0 which removes this category and treats them as "Limited Use Scripts.". This vulnerability affects Firefox < 54, Firefox ESR < 52.2, and Thunderbird < 52.2.
Los caracteres del bloque unicode "Canadian Syllabics" pueden mezclarse con caracteres de otros bloques unicode en la barra de direcciones en lugar de ser presentados en su forma "punycode" sin procesar. Esto permite ataques de suplantación de nombres de dominio mediante la confusión de caracteres. El estándar Unicode actual permite que los caracteres "Aspirational Use Scripts" como Canadian Syllabics se mezclen con los caracteres latinos en el perfil IDN "moderadamente restrictivo". Se ha modificado el comportamiento de Firefox para que coincida con la inminente versión 10.0 de Unicode, que elimina esta categoría y los trata como "Limited Use Scripts". La vulnerabilidad afecta a Firefox en versiones anteriores a la 54, Firefox ESR en versiones anteriores a la 52.2 y Thunderbird en versiones anteriores a la 52.2.
Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, read uninitialized memory, obtain sensitive information, spoof the addressbar contents, or execute arbitrary code. Multiple security issues were discovered in the Graphite 2 library used by Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, read uninitialized memory, or execute arbitrary code. Various other issues were also addressed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-04-12 CVE Reserved
- 2017-06-14 CVE Published
- 2024-08-05 CVE Updated
- 2024-08-05 First Exploit
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-20: Improper Input Validation
CAPEC
References (13)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/99057 | Third Party Advisory | |
http://www.securitytracker.com/id/1038689 | Third Party Advisory | |
http://www.unicode.org/reports/tr31/tr31-26.html#Aspirational_Use_Scripts | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1364283 | 2024-08-05 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/errata/RHSA-2017:1440 | 2018-08-13 | |
https://access.redhat.com/errata/RHSA-2017:1561 | 2018-08-13 | |
https://www.debian.org/security/2017/dsa-3881 | 2018-08-13 | |
https://www.debian.org/security/2017/dsa-3918 | 2018-08-13 | |
https://www.mozilla.org/security/advisories/mfsa2017-15 | 2018-08-13 | |
https://www.mozilla.org/security/advisories/mfsa2017-16 | 2018-08-13 | |
https://www.mozilla.org/security/advisories/mfsa2017-17 | 2018-08-13 | |
https://access.redhat.com/security/cve/CVE-2017-7764 | 2017-06-21 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1461262 | 2017-06-21 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Mozilla Search vendor "Mozilla" | Firefox Search vendor "Mozilla" for product "Firefox" | < 54.0 Search vendor "Mozilla" for product "Firefox" and version " < 54.0" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Esr Search vendor "Mozilla" for product "Firefox Esr" | < 52.2.0 Search vendor "Mozilla" for product "Firefox Esr" and version " < 52.2.0" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Thunderbird Search vendor "Mozilla" for product "Thunderbird" | < 52.2.0 Search vendor "Mozilla" for product "Thunderbird" and version " < 52.2.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
|