First published: Tue Jun 13 2017(Updated: )
A use-after-free and use-after-scope vulnerability when logging errors from headers for XML HTTP Requests (XHR). This could result in a potentially exploitable crash.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/firefox | 118.0.2-1 | |
debian/firefox-esr | 91.12.0esr-1~deb10u1 115.3.1esr-1~deb10u1 102.15.0esr-1~deb11u1 115.3.1esr-1~deb11u1 102.15.1esr-1~deb12u1 115.3.0esr-1~deb12u1 115.3.0esr-1 | |
Thunderbird | <52.2 | 52.2 |
Firefox | <54.0 | |
Firefox ESR | <52.2.0 | |
Thunderbird | <52.2.0 | |
Debian | =8.0 | |
Debian | =9.0 | |
Firefox | <54 | 54 |
Firefox ESR | <52.2 | 52.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2017-7756 has a moderate severity level due to its potential to cause crashes in affected applications.
To fix CVE-2017-7756, update your Mozilla Firefox or Thunderbird to versions above 54.0 or 52.2 respectively.
CVE-2017-7756 affects Mozilla Firefox versions 54 and below, Mozilla Firefox ESR up to version 52.2, and Mozilla Thunderbird up to version 52.2.
A use-after-free vulnerability, like CVE-2017-7756, occurs when a program attempts to access memory after it has already been freed, which can lead to application crashes or exploitation.
There are no known workarounds for CVE-2017-7756 other than upgrading to the latest versions of the affected software.