Mozilla Firefox before 41.0 does not properly restrict the availability of High Resolution Time API times, which allows remote attackers to track last-level cache access, and consequently obtain sensitive information, via crafted JavaScript code that makes performance.now calls.
References
Configurations
History
21 Nov 2024, 02:36
Type | Values Removed | Values Added |
---|---|---|
References | () http://arxiv.org/abs/1502.07373 - Exploit | |
References | () http://www.mozilla.org/security/announce/2015/mfsa2015-114.html - Vendor Advisory | |
References | () http://www.securitytracker.com/id/1033640 - | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=1153672 - | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=1167489 - |
Information
Published : 2015-09-24 04:59
Updated : 2024-11-21 02:36
NVD link : CVE-2015-7327
Mitre link : CVE-2015-7327
CVE.ORG link : CVE-2015-7327
JSON object : View
Products Affected
mozilla
- firefox
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor