CVE-2015-7327

Mozilla Firefox before 41.0 does not properly restrict the availability of High Resolution Time API times, which allows remote attackers to track last-level cache access, and consequently obtain sensitive information, via crafted JavaScript code that makes performance.now calls.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:36

Type Values Removed Values Added
References () http://arxiv.org/abs/1502.07373 - Exploit () http://arxiv.org/abs/1502.07373 - Exploit
References () http://www.mozilla.org/security/announce/2015/mfsa2015-114.html - Vendor Advisory () http://www.mozilla.org/security/announce/2015/mfsa2015-114.html - Vendor Advisory
References () http://www.securitytracker.com/id/1033640 - () http://www.securitytracker.com/id/1033640 -
References () https://bugzilla.mozilla.org/show_bug.cgi?id=1153672 - () https://bugzilla.mozilla.org/show_bug.cgi?id=1153672 -
References () https://bugzilla.mozilla.org/show_bug.cgi?id=1167489 - () https://bugzilla.mozilla.org/show_bug.cgi?id=1167489 -

Information

Published : 2015-09-24 04:59

Updated : 2024-11-21 02:36


NVD link : CVE-2015-7327

Mitre link : CVE-2015-7327

CVE.ORG link : CVE-2015-7327


JSON object : View

Products Affected

mozilla

  • firefox
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor