{ "CVE_data_meta" : { "ASSIGNER" : "security@mozilla.org", "ID" : "CVE-2017-7793", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "Firefox", "version" : { "version_data" : [ { "version_affected" : "<", "version_value" : "56" } ] } }, { "product_name" : "Firefox ESR", "version" : { "version_data" : [ { "version_affected" : "<", "version_value" : "52.4" } ] } }, { "product_name" : "Thunderbird", "version" : { "version_data" : [ { "version_affected" : "<", "version_value" : "52.4" } ] } } ] }, "vendor_name" : "Mozilla" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "A use-after-free vulnerability can occur in the Fetch API when the worker or the associated window are freed when still in use, resulting in a potentially exploitable crash. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "Use-after-free with Fetch API" } ] } ] }, "references" : { "reference_data" : [ { "name" : "[debian-lts-announce] 20171101 [SECURITY] [DLA 1153-1] icedove/thunderbird security update", "refsource" : "MLIST", "url" : "https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html" }, { "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1371889", "refsource" : "CONFIRM", "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1371889" }, { "name" : "https://www.mozilla.org/security/advisories/mfsa2017-21/", "refsource" : "CONFIRM", "url" : "https://www.mozilla.org/security/advisories/mfsa2017-21/" }, { "name" : "https://www.mozilla.org/security/advisories/mfsa2017-22/", "refsource" : "CONFIRM", "url" : "https://www.mozilla.org/security/advisories/mfsa2017-22/" }, { "name" : "https://www.mozilla.org/security/advisories/mfsa2017-23/", "refsource" : "CONFIRM", "url" : "https://www.mozilla.org/security/advisories/mfsa2017-23/" }, { "name" : "DSA-3987", "refsource" : "DEBIAN", "url" : "https://www.debian.org/security/2017/dsa-3987" }, { "name" : "DSA-4014", "refsource" : "DEBIAN", "url" : "https://www.debian.org/security/2017/dsa-4014" }, { "name" : "GLSA-201803-14", "refsource" : "GENTOO", "url" : "https://security.gentoo.org/glsa/201803-14" }, { "name" : "RHSA-2017:2831", "refsource" : "REDHAT", "url" : "https://access.redhat.com/errata/RHSA-2017:2831" }, { "name" : "RHSA-2017:2885", "refsource" : "REDHAT", "url" : "https://access.redhat.com/errata/RHSA-2017:2885" }, { "name" : "101055", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/101055" }, { "name" : "1039465", "refsource" : "SECTRACK", "url" : "http://www.securitytracker.com/id/1039465" } ] } }