An out-of-bounds read occurs when applying style rules to pseudo-elements, such as ::first-line, using cached style data. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://www.mozilla.org/security/advisories/mfsa2017-19/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2017-20/ | vendor advisory |
https://www.debian.org/security/2017/dsa-3968 | third party advisory vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2017-18/ | vendor advisory |
https://access.redhat.com/errata/RHSA-2017:2456 | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2017:2534 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/100315 | vdb entry third party advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1353312 | issue tracking patch vendor advisory exploit |
http://www.securitytracker.com/id/1039124 | vdb entry third party advisory |
https://security.gentoo.org/glsa/201803-14 | third party advisory vendor advisory |
https://www.debian.org/security/2017/dsa-3928 | third party advisory vendor advisory |