CVE-2017-7843

When Private Browsing mode is used, it is possible for a web worker to write persistent data to IndexedDB and fingerprint a user uniquely. IndexedDB should not be available in Private Browsing mode and this stored data will persist across multiple private browsing mode sessions because it is not cleared when exiting. This vulnerability affects Firefox ESR < 52.5.2 and Firefox < 57.0.1.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:32

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/102039 - Issue Tracking, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/102039 - Issue Tracking, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/102112 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/102112 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1039954 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1039954 - Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHSA-2017:3382 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2017:3382 - Third Party Advisory
References () https://bugzilla.mozilla.org/show_bug.cgi?id=1410106 - Exploit, Issue Tracking, Third Party Advisory () https://bugzilla.mozilla.org/show_bug.cgi?id=1410106 - Exploit, Issue Tracking, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2017/12/msg00003.html - Third Party Advisory () https://lists.debian.org/debian-lts-announce/2017/12/msg00003.html - Third Party Advisory
References () https://www.debian.org/security/2017/dsa-4062 - Third Party Advisory () https://www.debian.org/security/2017/dsa-4062 - Third Party Advisory
References () https://www.mozilla.org/security/advisories/mfsa2017-27/ - Vendor Advisory () https://www.mozilla.org/security/advisories/mfsa2017-27/ - Vendor Advisory
References () https://www.mozilla.org/security/advisories/mfsa2017-28/ - Vendor Advisory () https://www.mozilla.org/security/advisories/mfsa2017-28/ - Vendor Advisory

Information

Published : 2018-06-11 21:29

Updated : 2024-11-21 03:32


NVD link : CVE-2017-7843

Mitre link : CVE-2017-7843

CVE.ORG link : CVE-2017-7843


JSON object : View

Products Affected

mozilla

  • firefox
  • firefox_esr

redhat

  • enterprise_linux_server
  • enterprise_linux_server_eus
  • enterprise_linux_desktop
  • enterprise_linux_server_aus
  • enterprise_linux_workstation

debian

  • debian_linux
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor