CVE-2017-7764
Mozilla: Domain spoofing with combination of Canadian Syllabics and other unicode blocks (MFSA 2017-16)
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Characters from the "Canadian Syllabics" unicode block can be mixed with characters from other unicode blocks in the addressbar instead of being rendered as their raw "punycode" form, allowing for domain name spoofing attacks through character confusion. The current Unicode standard allows characters from "Aspirational Use Scripts" such as Canadian Syllabics to be mixed with Latin characters in the "moderately restrictive" IDN profile. We have changed Firefox behavior to match the upcoming Unicode version 10.0 which removes this category and treats them as "Limited Use Scripts.". This vulnerability affects Firefox < 54, Firefox ESR < 52.2, and Thunderbird < 52.2.
Los caracteres del bloque unicode "Canadian Syllabics" pueden mezclarse con caracteres de otros bloques unicode en la barra de direcciones en lugar de ser presentados en su forma "punycode" sin procesar. Esto permite ataques de suplantación de nombres de dominio mediante la confusión de caracteres. El estándar Unicode actual permite que los caracteres "Aspirational Use Scripts" como Canadian Syllabics se mezclen con los caracteres latinos en el perfil IDN "moderadamente restrictivo". Se ha modificado el comportamiento de Firefox para que coincida con la inminente versión 10.0 de Unicode, que elimina esta categoría y los trata como "Limited Use Scripts". La vulnerabilidad afecta a Firefox en versiones anteriores a la 54, Firefox ESR en versiones anteriores a la 52.2 y Thunderbird en versiones anteriores a la 52.2.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-04-12 CVE Reserved
- 2017-06-14 CVE Published
- 2024-08-05 CVE Updated
- 2024-08-05 First Exploit
- 2024-09-14 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-20: Improper Input Validation
CAPEC
References (13)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/99057 | Third Party Advisory | |
http://www.securitytracker.com/id/1038689 | Third Party Advisory | |
http://www.unicode.org/reports/tr31/tr31-26.html#Aspirational_Use_Scripts | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1364283 | 2024-08-05 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/errata/RHSA-2017:1440 | 2018-08-13 | |
https://access.redhat.com/errata/RHSA-2017:1561 | 2018-08-13 | |
https://www.debian.org/security/2017/dsa-3881 | 2018-08-13 | |
https://www.debian.org/security/2017/dsa-3918 | 2018-08-13 | |
https://www.mozilla.org/security/advisories/mfsa2017-15 | 2018-08-13 | |
https://www.mozilla.org/security/advisories/mfsa2017-16 | 2018-08-13 | |
https://www.mozilla.org/security/advisories/mfsa2017-17 | 2018-08-13 | |
https://access.redhat.com/security/cve/CVE-2017-7764 | 2017-06-21 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1461262 | 2017-06-21 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Mozilla Search vendor "Mozilla" | Firefox Search vendor "Mozilla" for product "Firefox" | < 54.0 Search vendor "Mozilla" for product "Firefox" and version " < 54.0" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Esr Search vendor "Mozilla" for product "Firefox Esr" | < 52.2.0 Search vendor "Mozilla" for product "Firefox Esr" and version " < 52.2.0" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Thunderbird Search vendor "Mozilla" for product "Thunderbird" | < 52.2.0 Search vendor "Mozilla" for product "Thunderbird" and version " < 52.2.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
|