CVE-2017-7814 PUBLISHED

File downloads encoded with "blob:" and "data:" URL elements bypassed normal file download checks though the Phishing and Malware Protection feature and its block lists of suspicious sites and files. This would allow malicious sites to lure users into downloading executables that would otherwise be detected as suspicious. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.

EPSS 0.32% · 54.8th percentile

Risk Scores

EPSS Score
0.32%
54.8th percentile

Affected Products

VendorProductVersions
Ubuntu:14.04:LTSfirefox0, 24.0+build1-0ubuntu1, 25.0+build3-0ubuntu0.13.10.1
Ubuntu:18.04:LTSthunderbird0
Ubuntu:18.04:LTSfirefox0
Ubuntu:16.04:LTSthunderbird1:52.3.0+build1-0ubuntu0.16.04.1, 1:52.2.1+build1-0ubuntu0.16.04.1, 1:52.1.1+build1-0ubuntu0.16.04.1
Ubuntu:16.04:LTSfirefox55.0.2+build1-0ubuntu0.16.04.1, 0, 41.0.2+build2-0ubuntu1
Ubuntu:14.04:LTSthunderbird1:31.6.0+build1-0ubuntu0.14.04.1, 1:31.5.0+build1-0ubuntu0.14.04.1, 1:31.4.0+build1-0ubuntu0.14.04.1

Timeline

References

Open in Interactive Console →