First published: Fri Dec 22 2017(Updated: )
Crafted CSS in an RSS feed can leak and reveal local path strings, which may contain user name.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Redhat Enterprise Linux Aus | =7.4 | |
Redhat Enterprise Linux Desktop | =6.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Eus | =7.4 | |
Redhat Enterprise Linux Eus | =7.5 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Workstation | =6.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
Mozilla Thunderbird | <52.5.2 | |
Mozilla Thunderbird | <52.5.2 | 52.5.2 |
debian/thunderbird | 1:115.12.0-1~deb11u1 1:115.16.0esr-1~deb11u1 1:115.12.0-1~deb12u1 1:115.16.0esr-1~deb12u1 1:128.2.0esr-1 1:128.3.0esr-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2017-7847 is a vulnerability that allows crafted CSS in an RSS feed to leak and reveal local path strings, which may contain the user name.
Thunderbird versions prior to 52.5.2 are affected by CVE-2017-7847.
CVE-2017-7847 has a severity score of 4.3 (high severity).
To fix CVE-2017-7847, you should upgrade Thunderbird to version 52.6.0 or higher.
You can find more information about CVE-2017-7847 at the following references: [Link 1](https://bugzilla.mozilla.org/show_bug.cgi?id=1411708), [Link 2](https://www.mozilla.org/en-US/security/advisories/mfsa2017-30/), [Link 3](http://www.securityfocus.com/bid/102258).