CVE-2017-16541

NameCVE-2017-16541
DescriptionTor Browser before 7.0.9 on macOS and Linux allows remote attackers to bypass the intended anonymity feature and discover a client IP address via vectors involving a crafted web site that leverages file:// mishandling in Firefox, aka TorMoil. NOTE: Tails is unaffected.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-1575-1, DSA-4327-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
firefox (PTS)sid128.0.2-1fixed
firefox-esr (PTS)bullseye115.12.0esr-1~deb11u1fixed
bullseye (security)115.13.0esr-1~deb11u1fixed
bookworm115.12.0esr-1~deb12u1fixed
bookworm (security)115.13.0esr-1~deb12u1fixed
trixie115.12.0esr-1fixed
sid115.13.0esr-2fixed
thunderbird (PTS)bullseye1:115.12.0-1~deb11u1fixed
bullseye (security)1:115.13.0-1~deb11u1fixed
bookworm1:115.12.0-1~deb12u1fixed
bookworm (security)1:115.13.0-1~deb12u1fixed
sid, trixie1:115.13.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
firefoxsource(unstable)62.0-1unimportant
firefox-esrsourcestretch60.2.0esr-1~deb9u2
firefox-esrsource(unstable)60.2.0esr-1unimportant
thunderbirdsourcejessie1:60.3.0-1~deb8u1DLA-1575-1
thunderbirdsourcestretch1:60.2.1-2~deb9u1DSA-4327-1
thunderbirdsource(unstable)1:60.2.1-1

Notes

https://trac.torproject.org/projects/tor/ticket/24052
https://blog.torproject.org/tor-browser-709-released
https://www.mozilla.org/en-US/security/advisories/mfsa2018-20/#CVE-2017-16541
https://www.mozilla.org/en-US/security/advisories/mfsa2018-21/#CVE-2017-16541
https://www.mozilla.org/en-US/security/advisories/mfsa2018-25/#CVE-2017-16541

Search for package or bug name: Reporting problems