RSA Authentication Manager 8.2 SP1 Vulnerabilities in Mozilla Firefox -false positive
Originally Published: 2018-03-06
Article Number
CVE Identifier(s)
Alert Impact
Not Exploitable
Resolution
- CVE-2017-7793 - Use-after-free with Fetch API
- Description
- A use-after-free vulnerability can occur in the Fetch API when the worker or the associated window are freed when still in use, resulting in a potentially exploitable crash.
- CVSSv3 Base Score 7.5 AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H (SUSE)
- Response: The flaw exists but cannot be exploited. The Firefox web browser is not used on the RSA Authentication Manager appliance.
- Description
- CVE-2017-7810 - Memory safety bugs fixed in Firefox 56 and Firefox ESR 52.4
- Description
- Mozilla developers and community members Christoph Diehl, Jan de Mooij, Jason Kratzer, Randell Jesup, Tom Ritter, Tyson Smith, and Sebastian Hengst reported memory safety bugs present in Firefox 55 and Firefox ESR 52.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code.
- CVSSv3 Base Score 8.8 AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H (SUSE)
- Response: The flaw exists but cannot be exploited. The Firefox web browser is not used on the RSA Authentication Manager appliance.
- Description
- CVE-2017-7814 - Blob and data URLs bypass phishing and malware protection warnings
- Description
- File downloads encoded with blob: and data: URL elements bypassed normal file download checks though the Phishing and Malware Protection feature and its block lists of suspicious sites and files. This would allow malicious sites to lure users into downloading executables that would otherwise be detected as suspicious.
- CVSSv3 Base Score 5.4 AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N (SUSE)
- Response: The flaw exists but cannot be exploited. The Firefox web browser is not used on the RSA Authentication Manager appliance.
- Description
- CVE-2017-7818 - Use-after-free during ARIA array manipulation
- Description
- A use-after-free vulnerability can occur when manipulating arrays of Accessible Rich Internet Applications (ARIA) elements within containers through the DOM. This results in a potentially exploitable crash.
- CVSSv3 Base Score 7.5 AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H (SUSE)
- Response: The flaw exists but cannot be exploited. The Firefox web browser is not used on the RSA Authentication Manager appliance.
- Description
- CVE-2017-7819 - Use-after-free while resizing images in design mode
- Description
- A use-after-free vulnerability can occur in design mode when image objects are resized if objects referenced during the resizing have been freed from memory. This results in a potentially exploitable crash.
- CVSSv3 Base Score 7.5 AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H (SUSE)
- Response: The flaw exists but cannot be exploited. The Firefox web browser is not used on the RSA Authentication Manager appliance.
- Description
- CVE-2017-7823 - CSP sandbox directive did not create a unique origin
- Description
- The content security policy (CSP) sandbox directive did not create a unique origin for the document, causing it to behave as if the allow-same-origin keyword were always specified. This could allow a Cross-Site Scripting (XSS) attack to be launched from unsafe content.
- CVSSv3 Base Score 5.4 AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N (SUSE)
- Response: The flaw exists but cannot be exploited. The Firefox web browser is not used on the RSA Authentication Manager appliance.
- Description
- CVE-2017-7824 - Buffer overflow when drawing and validating elements with ANGLE
- Description
- A buffer overflow occurs when drawing and validating elements with the ANGLE graphics library, used for WebGL content. This is due to an incorrect value being passed within the library during checks and results in a potentially exploitable crash.
- CVSSv3 Base Score 7.5 AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H (SUSE)
- Response: The flaw exists but cannot be exploited. The Firefox web browser is not used on the RSA Authentication Manager appliance.
- Description
- CVE-2017-7825 - OS X fonts render some Tibetan and Arabic Unicode characters as spaces
- Description
- Several fonts on OS X display some Tibetan and Arabic characters as whitespace. When used in the address bar as part of an IDN this can be used for domain name spoofing attacks.
- CVSSv3 Base Score 5.4 AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N (SUSE)
- Response: The flaw exists but cannot be exploited. The Firefox web browser is not used on the RSA Authentication Manager appliance.
- Description
Disclaimer
Related Articles
RSA-2024-13: RSA Authentication Agent for Microsoft Windows Security Update 242Number of Views Administrator is able to change a user password in RSA ACE/Server even though it is not allowed in his task list 3Number of Views Supported operating systems for the RSA SecurID Authentication Agent 8.1 for PAM 128Number of Views How to prevent a local administrator from setting a reserve password in the RSA Authentication Agent for Windows Control C… 334Number of Views User changes his mobile device in RSA Cloud Authentication Service 126Number of Views
Trending Articles
Downloading RSA Authentication Manager license files or RSA Software token seed records RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Release Notes for RSA Authentication Manager 8.8 Download RSA SecurID Access Cloud User Event audit logs using Cloud Administration REST API CLU RSA SecurID Software Token 5.0.2 for Windows Desktop displays message after reboot due to roaming profile: No token stor…
Don't see what you're looking for?