First published: Thu Dec 07 2017(Updated: )
A buffer overflow occurs when drawing and validating elements using Direct 3D 9 with the ANGLE graphics library, used for WebGL content. This is due to an incorrect value being passed within the library during checks and results in a potentially exploitable crash. Note: This attack only affects Windows operating systems. Other operating systems are unaffected.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
<52.5.2 | 52.5.2 | |
<57.0.2 | 57.0.2 | |
Mozilla Thunderbird | <52.5.2 | 52.5.2 |
<52.5.2 | 52.5.2 | |
Mozilla Firefox | <57.0.2 | |
Mozilla Firefox ESR | <52.5.2 | |
Mozilla Thunderbird | <52.5.2 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2017-7845 is a vulnerability that occurs when drawing and validating elements using Direct3D 9 with the ANGLE graphics library.
CVE-2017-7845 affects Mozilla Firefox versions up to and excluding 57.0.2
CVE-2017-7845 affects Mozilla Thunderbird version 52.5.2
CVE-2017-7845 has a severity rating of 8.8 (critical)
To fix CVE-2017-7845, update Mozilla Firefox to version 57.0.2 or later, or update Mozilla Thunderbird to version 52.5.2 or later.