CVE-2017-16541

NameCVE-2017-16541
DescriptionTor Browser before 7.0.9 on macOS and Linux allows remote attackers to bypass the intended anonymity feature and discover a client IP address via vectors involving a crafted web site that leverages file:// mishandling in Firefox, aka TorMoil. NOTE: Tails is unaffected.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1575-1, DSA-4327-1
NVD severitymedium (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
firefox (PTS)sid63.0.3-1fixed
firefox-esr (PTS)jessie52.8.1esr-1~deb8u1vulnerable
jessie (security)60.3.0esr-1~deb8u1fixed
stretch (security), stretch60.3.0esr-1~deb9u1fixed
buster60.3.0esr-1fixed
sid60.3.0esr-3fixed
thunderbird (PTS)jessie1:52.8.0-1~deb8u1vulnerable
jessie (security)1:60.3.0-1~deb8u1fixed
stretch1:60.2.1-2~deb9u1fixed
stretch (security)1:60.3.0-1~deb9u1fixed
buster, sid1:60.3.1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
firefoxsource(unstable)62.0-1unimportant
firefox-esrsource(unstable)60.2.0esr-1unimportant
firefox-esrsourcestretch60.2.0esr-1~deb9u2medium
thunderbirdsource(unstable)1:60.2.1-1medium
thunderbirdsourcejessie1:60.3.0-1~deb8u1mediumDLA-1575-1
thunderbirdsourcestretch1:60.2.1-2~deb9u1mediumDSA-4327-1

Notes

https://trac.torproject.org/projects/tor/ticket/24052
https://blog.torproject.org/tor-browser-709-released
https://www.mozilla.org/en-US/security/advisories/mfsa2018-20/#CVE-2017-16541
https://www.mozilla.org/en-US/security/advisories/mfsa2018-21/#CVE-2017-16541
https://www.mozilla.org/en-US/security/advisories/mfsa2018-25/#CVE-2017-16541

Search for package or bug name: Reporting problems