An attacker could use a JavaScript Map/Set timing attack to determine whether an atom is used by another compartment/zone in specific contexts. This could be used to leak information, such as usernames embedded in JavaScript code, across websites. This vulnerability affects Firefox < 50.1, Firefox ESR < 45.6, and Thunderbird < 45.6.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-743-1 | firefox-esr security update |
![]() |
DLA-782-1 | icedove security update |
![]() |
DSA-3734-1 | firefox-esr security update |
![]() |
DSA-3757-1 | icedove security update |
![]() |
EUVD-2016-10693 | An attacker could use a JavaScript Map/Set timing attack to determine whether an atom is used by another compartment/zone in specific contexts. This could be used to leak information, such as usernames embedded in JavaScript code, across websites. This vulnerability affects Firefox < 50.1, Firefox ESR < 45.6, and Thunderbird < 45.6. |
![]() |
USN-3155-1 | Firefox vulnerabilities |
![]() |
USN-3165-1 | Thunderbird vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: mozilla
Published:
Updated: 2024-08-06T03:07:31.215Z
Reserved: 2016-12-07T00:00:00
Link: CVE-2016-9904

No data.

Status : Modified
Published: 2018-06-11T21:29:02.467
Modified: 2024-11-21T03:01:59.007
Link: CVE-2016-9904


No data.