CVE-2017-7805

NameCVE-2017-7805
DescriptionDuring TLS 1.2 exchanges, handshake hashes are generated which point to a message buffer. This saved data is used for later messages but in some cases, the handshake transcript can exceed the space available in the current buffer, causing the allocation of a new buffer. This leaves a pointer pointing to the old, freed buffer, resulting in a use-after-free when handshake hashes are then calculated afterwards. This can result in a potentially exploitable crash. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-1118-1, DLA-1138-1, DLA-1153-1, DSA-3987-1, DSA-3998-1, DSA-4014-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
firefox (PTS)sid133.0.3-1fixed
firefox-esr (PTS)jessie, jessie (lts)68.9.0esr-1~deb8u2fixed
stretch (security), stretch (lts), stretch91.11.0esr-1~deb9u1fixed
buster (security), buster, buster (lts)115.12.0esr-1~deb10u1fixed
bullseye115.14.0esr-1~deb11u1fixed
bullseye (security)128.5.0esr-1~deb11u1fixed
bookworm128.3.1esr-1~deb12u1fixed
bookworm (security)128.5.0esr-1~deb12u1fixed
trixie128.5.0esr-1fixed
sid128.5.1esr-1fixed
nss (PTS)jessie, jessie (lts)2:3.26-1+debu8u19fixed
stretch (security)2:3.26.2-1.1+deb9u5fixed
stretch (lts), stretch2:3.26.2-1.1+deb9u8fixed
buster, buster (lts)2:3.42.1-1+deb10u9fixed
buster (security)2:3.42.1-1+deb10u8fixed
bullseye2:3.61-1+deb11u3fixed
bullseye (security)2:3.61-1+deb11u4fixed
bookworm2:3.87.1-1fixed
bookworm (security)2:3.87.1-1+deb12u1fixed
sid, trixie2:3.106-1fixed
thunderbird (PTS)jessie, jessie (lts)1:68.9.0-1~deb8u2fixed
stretch (security), stretch (lts), stretch1:91.10.0-1~deb9u1fixed
buster (security), buster, buster (lts)1:115.12.0-1~deb10u1fixed
bullseye1:115.12.0-1~deb11u1fixed
bullseye (security)1:128.5.0esr-1~deb11u1fixed
bookworm1:115.16.0esr-1~deb12u1fixed
bookworm (security)1:128.5.0esr-1~deb12u1fixed
sid, trixie1:128.5.2esr-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
firefoxsource(unstable)56.0-1
firefox-esrsourcewheezy52.4.0esr-2~deb7u1DLA-1118-1
firefox-esrsourcejessie52.4.0esr-1~deb8u1DSA-3987-1
firefox-esrsourcestretch52.4.0esr-1~deb9u1DSA-3987-1
firefox-esrsource(unstable)52.4.0esr-2
nsssourcewheezy2:3.26-1+debu7u5DLA-1138-1
nsssourcejessie2:3.26-1+debu8u3DSA-3998-1
nsssourcestretch2:3.26.2-1.1+deb9u1DSA-3998-1
nsssource(unstable)2:3.33-1
thunderbirdsourcewheezy1:52.4.0-1~deb7u1DLA-1153-1
thunderbirdsourcejessie1:52.4.0-1~deb8u1DSA-4014-1
thunderbirdsourcestretch1:52.4.0-1~deb9u1DSA-4014-1
thunderbirdsource(unstable)1:52.4.0-1

Notes

https://hg.mozilla.org/projects/nss/rev/839200ce0943166a079284bdf45dcc37bb672925
https://bugzilla.mozilla.org/show_bug.cgi?id=1377618 (not public)
https://www.mozilla.org/en-US/security/advisories/mfsa2017-21/#CVE-2017-7805
https://www.mozilla.org/en-US/security/advisories/mfsa2017-22/#CVE-2017-7805
https://www.mozilla.org/en-US/security/advisories/mfsa2017-23/#CVE-2017-7805

Search for package or bug name: Reporting problems