First published: Fri Mar 17 2017(Updated: )
An integer overflow in "createImageBitmap()" was reported through the Pwn2Own contest. The fix for this vulnerability disables the experimental extensions to the "createImageBitmap" API. This function runs in the content sandbox, requiring a second vulnerability to compromise a user's computer. This vulnerability affects Firefox ESR < 52.0.1 and Firefox < 52.0.1.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <52.0.1 | 52.0.1 |
Mozilla Firefox ESR | <52.0.1 | 52.0.1 |
Red Hat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =7.3 | |
Red Hat Enterprise Linux Server | =7.4 | |
Red Hat Enterprise Linux Server | =7.3 | |
Red Hat Enterprise Linux Server | =7.4 | |
Red Hat Enterprise Linux Server | =7.5 | |
Redhat Enterprise Linux Workstation | =7.0 | |
Mozilla Firefox | <52.0.1 | |
Mozilla Firefox ESR | <52.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-5428 has a moderate severity level due to the potential for exploitation through a second vulnerability.
CVE-2017-5428 affects web applications that utilize the 'createImageBitmap()' API, allowing for potential integer overflow vulnerabilities.
To fix CVE-2017-5428, upgrade to the latest version of Mozilla Firefox or Firefox ESR beyond 52.0.1.
CVE-2017-5428 affects Mozilla Firefox and Firefox ESR versions up to and including 52.0.1.
CVE-2017-5428 is not directly exploitable remotely, as it requires a secondary vulnerability to compromise a user's system.