First published: Thu Sep 28 2017(Updated: )
A buffer overflow occurs when drawing and validating elements with the ANGLE graphics library, used for WebGL content. This is due to an incorrect value being passed within the library during checks and results in a potentially exploitable crash.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox ESR | <52.4 | 52.4 |
Mozilla Thunderbird | <52.4 | 52.4 |
Mozilla Firefox | <56 | 56 |
Redhat Enterprise Linux Aus | =7.4 | |
Redhat Enterprise Linux Desktop | =6.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Eus | =7.4 | |
Redhat Enterprise Linux Eus | =7.5 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Workstation | =6.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Mozilla Firefox | <56.0 | |
Mozilla Firefox ESR | <52.4.0 | |
Mozilla Thunderbird | <52.4.0 | |
debian/firefox | 131.0.2-2 | |
debian/firefox-esr | 115.14.0esr-1~deb11u1 128.3.1esr-1~deb11u1 115.14.0esr-1~deb12u1 128.3.1esr-1~deb12u1 128.3.0esr-2 128.3.1esr-2 | |
debian/thunderbird | 1:115.12.0-1~deb11u1 1:115.16.0esr-1~deb11u1 1:115.12.0-1~deb12u1 1:115.16.0esr-1~deb12u1 1:128.2.0esr-1 1:128.3.0esr-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2017-7824 is a vulnerability that occurs when drawing and validating elements with the ANGLE graphics library used for WebGL content.
The severity of CVE-2017-7824 is critical with a severity score of 9.8.
Mozilla Firefox versions before 56 and Firefox ESR versions before 52.4 are affected by CVE-2017-7824.
To fix CVE-2017-7824, update your Mozilla Firefox to version 56 or later, or update your Firefox ESR to version 52.4 or later.
You can find more information about CVE-2017-7824 from the following sources: [Mozilla Bugzilla](https://bugzilla.mozilla.org/show_bug.cgi?id=1398381), [Mozilla Security Advisories](https://www.mozilla.org/en-US/security/advisories/mfsa2017-22/), [SecurityFocus](http://www.securityfocus.com/bid/101053).