First published: Wed Apr 19 2017(Updated: )
A mechanism to bypass file system access protections in the sandbox using the file system request constructor through an IPC message. This allows for read and write access to the local file system.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox ESR | <52.1 | 52.1 |
Mozilla Firefox | <53 | 53 |
Red Hat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =7.3 | |
Red Hat Enterprise Linux Server | =7.4 | |
Red Hat Enterprise Linux Server | =7.3 | |
Red Hat Enterprise Linux Server | =7.4 | |
Red Hat Enterprise Linux Server | =7.5 | |
Redhat Enterprise Linux Workstation | =7.0 | |
Mozilla Firefox | <53.0 | |
Mozilla Firefox ESR | <52.1.0 | |
debian/firefox | 135.0.1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2017-5456 is classified as a high severity vulnerability that allows unauthorized access to the local file system.
To fix CVE-2017-5456, update Firefox ESR to version 52.2 or later, or Firefox to version 53.0 or later.
CVE-2017-5456 affects Firefox versions earlier than 53 and Firefox ESR versions up to and including 52.1.
Yes, CVE-2017-5456 can affect Red Hat Enterprise Linux versions 7.0, 7.3, 7.4, and 7.5 that include vulnerable Firefox packages.
The impact of CVE-2017-5456 is that it allows a malicious actor to bypass file system access protections, potentially leading to unauthorized data access.