UBUNTU-CVE-2017-5418

Source
https://ubuntu.com/security/CVE-2017-5418
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-5418.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2017-5418
Upstream
  • CVE-2017-5418
Downstream
Related
Published
2017-03-07T00:00:00Z
Modified
2026-02-04T02:35:37.394211Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
  • Ubuntu - low
Summary
[none]
Details

An out of bounds read error occurs when parsing some HTTP digest authorization responses, resulting in information leakage through the reading of random memory containing matches to specifically set patterns. This vulnerability affects Firefox < 52 and Thunderbird < 52.

References

Affected packages

Ubuntu:14.04:LTS / firefox

Package

Name
firefox
Purl
pkg:deb/ubuntu/firefox@52.0+build2-0ubuntu0.14.04.1?arch=source&distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
52.0+build2-0ubuntu0.14.04.1

Affected versions

24.*
24.0+build1-0ubuntu1
25.*
25.0+build3-0ubuntu0.13.10.1
28.*
28.0~b2+build1-0ubuntu2
28.0+build1-0ubuntu1
28.0+build2-0ubuntu1
28.0+build2-0ubuntu2
29.*
29.0+build1-0ubuntu0.14.04.2
30.*
30.0+build1-0ubuntu0.14.04.3
31.*
31.0+build1-0ubuntu0.14.04.1
32.*
32.0+build1-0ubuntu0.14.04.1
32.0.3+build1-0ubuntu0.14.04.1
33.*
33.0+build2-0ubuntu0.14.04.1
34.*
34.0+build2-0ubuntu0.14.04.1
35.*
35.0+build3-0ubuntu0.14.04.2
35.0.1+build1-0ubuntu0.14.04.1
36.*
36.0+build2-0ubuntu0.14.04.4
36.0.1+build2-0ubuntu0.14.04.1
36.0.4+build1-0ubuntu0.14.04.1
37.*
37.0+build2-0ubuntu0.14.04.1
37.0.1+build1-0ubuntu0.14.04.1
37.0.2+build1-0ubuntu0.14.04.1
38.*
38.0+build3-0ubuntu0.14.04.1
39.*
39.0+build5-0ubuntu0.14.04.1
39.0.3+build2-0ubuntu0.14.04.1
40.*
40.0+build4-0ubuntu0.14.04.1
40.0+build4-0ubuntu0.14.04.4
40.0.3+build1-0ubuntu0.14.04.1
41.*
41.0+build3-0ubuntu0.14.04.1
41.0.1+build2-0ubuntu0.14.04.1
41.0.2+build2-0ubuntu0.14.04.1
42.*
42.0+build2-0ubuntu0.14.04.1
43.*
43.0+build1-0ubuntu0.14.04.1
43.0.4+build3-0ubuntu0.14.04.1
44.*
44.0+build3-0ubuntu0.14.04.1
44.0.1+build2-0ubuntu0.14.04.1
44.0.2+build1-0ubuntu0.14.04.1
45.*
45.0+build2-0ubuntu0.14.04.1
45.0.1+build1-0ubuntu0.14.04.2
45.0.2+build1-0ubuntu0.14.04.1
46.*
46.0+build5-0ubuntu0.14.04.2
46.0.1+build1-0ubuntu0.14.04.3
47.*
47.0+build3-0ubuntu0.14.04.1
48.*
48.0+build2-0ubuntu0.14.04.1
49.*
49.0+build4-0ubuntu0.14.04.1
49.0.2+build2-0ubuntu0.14.04.1
50.*
50.0+build2-0ubuntu0.14.04.2
50.0.2+build1-0ubuntu0.14.04.1
50.1.0+build2-0ubuntu0.14.04.1
51.*
51.0.1+build2-0ubuntu0.14.04.1
51.0.1+build2-0ubuntu0.14.04.2

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "firefox",
            "binary_version": "52.0+build2-0ubuntu0.14.04.1"
        },
        {
            "binary_name": "firefox-dev",
            "binary_version": "52.0+build2-0ubuntu0.14.04.1"
        },
        {
            "binary_name": "firefox-globalmenu",
            "binary_version": "52.0+build2-0ubuntu0.14.04.1"
        },
        {
            "binary_name": "firefox-mozsymbols",
            "binary_version": "52.0+build2-0ubuntu0.14.04.1"
        },
        {
            "binary_name": "firefox-testsuite",
            "binary_version": "52.0+build2-0ubuntu0.14.04.1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-5418.json"

Ubuntu:16.04:LTS / firefox

Package

Name
firefox
Purl
pkg:deb/ubuntu/firefox@52.0+build2-0ubuntu0.16.04.1?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
52.0+build2-0ubuntu0.16.04.1

Affected versions

41.*
41.0.2+build2-0ubuntu1
42.*
42.0+build2-0ubuntu1
44.*
44.0+build3-0ubuntu2
44.0.1+build1-0ubuntu1
44.0.2+build1-0ubuntu1
45.*
45.0+build2-0ubuntu1
45.0.1+build1-0ubuntu1
45.0.2+build1-0ubuntu1
46.*
46.0+build5-0ubuntu0.16.04.2
46.0.1+build1-0ubuntu0.16.04.2
47.*
47.0+build3-0ubuntu0.16.04.1
48.*
48.0+build2-0ubuntu0.16.04.1
49.*
49.0+build4-0ubuntu0.16.04.1
49.0.2+build2-0ubuntu0.16.04.2
50.*
50.0+build2-0ubuntu0.16.04.2
50.0.2+build1-0ubuntu0.16.04.1
50.1.0+build2-0ubuntu0.16.04.1
51.*
51.0.1+build2-0ubuntu0.16.04.1
51.0.1+build2-0ubuntu0.16.04.2

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "firefox",
            "binary_version": "52.0+build2-0ubuntu0.16.04.1"
        },
        {
            "binary_name": "firefox-dev",
            "binary_version": "52.0+build2-0ubuntu0.16.04.1"
        },
        {
            "binary_name": "firefox-globalmenu",
            "binary_version": "52.0+build2-0ubuntu0.16.04.1"
        },
        {
            "binary_name": "firefox-mozsymbols",
            "binary_version": "52.0+build2-0ubuntu0.16.04.1"
        },
        {
            "binary_name": "firefox-testsuite",
            "binary_version": "52.0+build2-0ubuntu0.16.04.1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-5418.json"