CVE-2017-7764

Characters from the "Canadian Syllabics" unicode block can be mixed with characters from other unicode blocks in the addressbar instead of being rendered as their raw "punycode" form, allowing for domain name spoofing attacks through character confusion. The current Unicode standard allows characters from "Aspirational Use Scripts" such as Canadian Syllabics to be mixed with Latin characters in the "moderately restrictive" IDN profile. We have changed Firefox behavior to match the upcoming Unicode version 10.0 which removes this category and treats them as "Limited Use Scripts.". This vulnerability affects Firefox < 54, Firefox ESR < 52.2, and Thunderbird < 52.2.
References
Link Resource
http://www.securityfocus.com/bid/99057 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1038689 Third Party Advisory VDB Entry
http://www.unicode.org/reports/tr31/tr31-26.html#Aspirational_Use_Scripts Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:1440 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:1561 Third Party Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=1364283 Exploit Issue Tracking Vendor Advisory
https://www.debian.org/security/2017/dsa-3881 Third Party Advisory
https://www.debian.org/security/2017/dsa-3918 Third Party Advisory
https://www.mozilla.org/security/advisories/mfsa2017-15/ Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2017-16/ Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2017-17/ Vendor Advisory
http://www.securityfocus.com/bid/99057 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1038689 Third Party Advisory VDB Entry
http://www.unicode.org/reports/tr31/tr31-26.html#Aspirational_Use_Scripts Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:1440 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:1561 Third Party Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=1364283 Exploit Issue Tracking Vendor Advisory
https://www.debian.org/security/2017/dsa-3881 Third Party Advisory
https://www.debian.org/security/2017/dsa-3918 Third Party Advisory
https://www.mozilla.org/security/advisories/mfsa2017-15/ Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2017-16/ Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2017-17/ Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:32

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/99057 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/99057 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1038689 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1038689 - Third Party Advisory, VDB Entry
References () http://www.unicode.org/reports/tr31/tr31-26.html#Aspirational_Use_Scripts - Third Party Advisory () http://www.unicode.org/reports/tr31/tr31-26.html#Aspirational_Use_Scripts - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2017:1440 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2017:1440 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2017:1561 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2017:1561 - Third Party Advisory
References () https://bugzilla.mozilla.org/show_bug.cgi?id=1364283 - Exploit, Issue Tracking, Vendor Advisory () https://bugzilla.mozilla.org/show_bug.cgi?id=1364283 - Exploit, Issue Tracking, Vendor Advisory
References () https://www.debian.org/security/2017/dsa-3881 - Third Party Advisory () https://www.debian.org/security/2017/dsa-3881 - Third Party Advisory
References () https://www.debian.org/security/2017/dsa-3918 - Third Party Advisory () https://www.debian.org/security/2017/dsa-3918 - Third Party Advisory
References () https://www.mozilla.org/security/advisories/mfsa2017-15/ - Vendor Advisory () https://www.mozilla.org/security/advisories/mfsa2017-15/ - Vendor Advisory
References () https://www.mozilla.org/security/advisories/mfsa2017-16/ - Vendor Advisory () https://www.mozilla.org/security/advisories/mfsa2017-16/ - Vendor Advisory
References () https://www.mozilla.org/security/advisories/mfsa2017-17/ - Vendor Advisory () https://www.mozilla.org/security/advisories/mfsa2017-17/ - Vendor Advisory

Information

Published : 2018-06-11 21:29

Updated : 2024-11-21 03:32


NVD link : CVE-2017-7764

Mitre link : CVE-2017-7764

CVE.ORG link : CVE-2017-7764


JSON object : View

Products Affected

mozilla

  • firefox
  • firefox_esr
  • thunderbird

debian

  • debian_linux
CWE
CWE-20

Improper Input Validation