First published: Tue Aug 08 2017(Updated: )
An error in the "WindowsDllDetourPatcher" where a RWX ("Read/Write/Execute") 4k block is allocated but never protected, violating DEP protections. Note: This attack only affects Windows operating systems. Other operating systems are not affected. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Thunderbird | <52.3 | 52.3 |
Firefox | <55.0 | |
Firefox ESR | <52.3.0 | |
Thunderbird | <52.3.0 | |
Microsoft Windows | ||
Firefox | <55 | 55 |
Firefox ESR | <52.3 | 52.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2017-7782 has been classified as a moderate severity vulnerability due to its potential to bypass Data Execution Prevention (DEP) protections.
To mitigate CVE-2017-7782, update Firefox and Thunderbird to versions 55 and 52.3 or later respectively.
CVE-2017-7782 affects Mozilla Firefox versions prior to 55, Mozilla Firefox ESR versions prior to 52.3, and Mozilla Thunderbird versions prior to 52.3.
CVE-2017-7782 only affects Windows operating systems and does not impact other operating systems.
CVE-2017-7782 involves the allocation of a RWX 4k memory block that is not adequately protected, violating DEP security measures.