File downloads encoded with "blob:" and "data:" URL elements bypassed normal file download checks though the Phishing and Malware Protection feature and its block lists of suspicious sites and files. This would allow malicious sites to lure users into downloading executables that would otherwise be detected as suspicious. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
redhat enterprise linux server 7.0 |
||
redhat enterprise linux workstation 7.0 |
||
redhat enterprise linux desktop 7.0 |
||
redhat enterprise linux server 6.0 |
||
redhat enterprise linux server eus 7.5 |
||
redhat enterprise linux server eus 7.4 |
||
redhat enterprise linux server aus 7.4 |
||
redhat enterprise linux workstation 6.0 |
||
redhat enterprise linux desktop 6.0 |
||
mozilla firefox |
||
mozilla firefox esr |
||
mozilla thunderbird |
||
debian debian linux 7.0 |
||
debian debian linux 9.0 |
||
debian debian linux 8.0 |