製品・ソフトウェアに関する情報
Firefox における情報漏えいに関する脆弱性
Title Firefox における情報漏えいに関する脆弱性
Summary

Firefox には、情報漏えいに関する脆弱性が存在します。

Possible impacts 情報を取得される可能性があります。
Solution

ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。

Publication Date March 13, 2018, midnight
Registration Date Aug. 20, 2018, 5:33 p.m.
Last Update Aug. 20, 2018, 5:33 p.m.
CVSS3.0 : 警告
Score 5.9
Vector CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS2.0 : 警告
Score 4.3
Vector AV:N/AC:M/Au:N/C:P/I:N/A:N
Affected System
レッドハット
Red Hat Enterprise Linux Desktop 
Red Hat Enterprise Linux Server 
Red Hat Enterprise Linux Server AUS
Red Hat Enterprise Linux Server EUS
Red Hat Enterprise Linux Workstation 
Mozilla Foundation
Mozilla Firefox 59 未満
Mozilla Firefox ESR 52.7 未満
Debian
Debian GNU/Linux 
Canonical
Ubuntu 
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
No Changed Details Date of change
1 [2018年08月20日]
  掲載
Aug. 20, 2018, 5:33 p.m.

NVD Vulnerability Information
CVE-2018-5131
Summary

Under certain circumstances the "fetch()" API can return transient local copies of resources that were sent with a "no-store" or "no-cache" cache header instead of downloading a copy from the network as it should. This can result in previously stored, locally cached data of a website being accessible to users if they share a common profile while browsing. This vulnerability affects Firefox ESR < 52.7 and Firefox < 59.

Publication Date June 12, 2018, 6:29 a.m.
Registration Date March 1, 2021, 7:30 p.m.
Last Update Nov. 21, 2024, 1:08 p.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
Configuration2 or higher or less more than less than
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* 59.0
Configuration3 or higher or less more than less than
cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:* 52.7.0
Configuration4 or higher or less more than less than
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
Configuration5 or higher or less more than less than
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List