{"id":"CVE-2017-7805","details":"During TLS 1.2 exchanges, handshake hashes are generated which point to a message buffer. This saved data is used for later messages but in some cases, the handshake transcript can exceed the space available in the current buffer, causing the allocation of a new buffer. This leaves a pointer pointing to the old, freed buffer, resulting in a use-after-free when handshake hashes are then calculated afterwards. This can result in a potentially exploitable crash. This vulnerability affects Firefox \u003c 56, Firefox ESR \u003c 52.4, and Thunderbird \u003c 52.4.","modified":"2026-04-16T06:20:05.700821183Z","published":"2018-06-11T21:29:10.047Z","related":["SUSE-SU-2017:2688-1","SUSE-SU-2017:2872-1","SUSE-SU-2017:2872-2","openSUSE-SU-2017:2707-1","openSUSE-SU-2017:2710-1","openSUSE-SU-2024:10600-1","openSUSE-SU-2024:10601-1","openSUSE-SU-2024:14572-1"],"references":[{"type":"ADVISORY","url":"https://www.debian.org/security/2017/dsa-3998"},{"type":"ADVISORY","url":"https://www.mozilla.org/security/advisories/mfsa2017-21/"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201803-14"},{"type":"ADVISORY","url":"https://www.debian.org/security/2017/dsa-4014"},{"type":"ADVISORY","url":"https://www.mozilla.org/security/advisories/mfsa2017-22/"},{"type":"ADVISORY","url":"https://www.mozilla.org/security/advisories/mfsa2017-23/"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/101059"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1039465"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2832"},{"type":"ADVISORY","url":"https://www.debian.org/security/2017/dsa-3987"},{"type":"REPORT","url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1377618"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-7805.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"52.4.0"}]},{"events":[{"introduced":"0"},{"last_affected":"56.0"}]},{"events":[{"introduced":"0"},{"last_affected":"52.4.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}