Vulnerability Name: | CVE-2017-5928 (CCN-123605) | ||||||||||||
Assigned: | 2017-02-27 | ||||||||||||
Published: | 2017-02-27 | ||||||||||||
Updated: | 2021-09-13 | ||||||||||||
Summary: | The W3C High Resolution Time API, as implemented in various web browsers, does not consider that memory-reference times can be measured by a performance.now "Time to Tick" approach even with the https://bugzilla.mozilla.org/show_bug.cgi?id=1167489#c9 protection mechanism in place, which makes it easier for remote attackers to conduct AnC attacks via crafted JavaScript code. | ||||||||||||
CVSS v3 Severity: | 3.7 Low (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N) 3.3 Low (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:U/RC:R)
3.3 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:U/RC:R)
| ||||||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N)
| ||||||||||||
Vulnerability Type: | CWE-noinfo | ||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2017-5928 Source: MISC Type: Technical Description http://www.cs.vu.nl/~herbertb/download/papers/anc_ndss17.pdf Source: BID Type: Third Party Advisory, VDB Entry 97036 Source: CCN Type: BID-97036 W3C High Resolution Time API CVE-2017-5928 Security Vulnerability Source: XF Type: UNKNOWN w3c-cve20175928-weak-security(123605) Source: CCN Type: W3C Web site High Resolution Time Source: MISC Type: Third Party Advisory https://www.vusec.net/projects/anc Source: CCN Type: VUSec Web site Address Space Layout Randomization | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
BACK |