Hashed codes of JavaScript objects are shared between pages. This allows for pointer leaks because an object's address can be discovered through hash codes, and also allows for data leakage of an object's content using these hash codes. This vulnerability affects Thunderbird < 45.7, Firefox ESR < 45.7, and Firefox < 51.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-800-1 | firefox-esr security update |
![]() |
DLA-896-1 | icedove/thunderbird security update |
![]() |
DSA-3771-1 | firefox-esr security update |
![]() |
DSA-3832-1 | icedove security update |
![]() |
EUVD-2017-14482 | Hashed codes of JavaScript objects are shared between pages. This allows for pointer leaks because an object's address can be discovered through hash codes, and also allows for data leakage of an object's content using these hash codes. This vulnerability affects Thunderbird < 45.7, Firefox ESR < 45.7, and Firefox < 51. |
![]() |
USN-3165-1 | Thunderbird vulnerabilities |
![]() |
USN-3175-1 | Firefox vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: mozilla
Published:
Updated: 2024-08-05T14:55:35.814Z
Reserved: 2017-01-13T00:00:00
Link: CVE-2017-5378

No data.

Status : Modified
Published: 2018-06-11T21:29:02.907
Modified: 2024-11-21T03:27:29.000
Link: CVE-2017-5378


No data.