Vulnerabilities > CVE-2017-5928 - Unspecified vulnerability in W3 High Resolution Time API
Attack vector
NETWORK Attack complexity
HIGH Privileges required
NONE Confidentiality impact
LOW Integrity impact
NONE Availability impact
NONE Summary
The W3C High Resolution Time API, as implemented in various web browsers, does not consider that memory-reference times can be measured by a performance.now "Time to Tick" approach even with the https://bugzilla.mozilla.org/show_bug.cgi?id=1167489#c9 protection mechanism in place, which makes it easier for remote attackers to conduct AnC attacks via crafted JavaScript code.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
The Hacker News
id | THN:55DCE5151C7426765AA8AC26030C6B03 |
last seen | 2018-01-27 |
modified | 2017-02-16 |
published | 2017-02-16 |
reporter | Swati Khandelwal |
source | https://thehackernews.com/2017/02/bypass-aslr-browser-javascript.html |
title | A Simple JavaScript Exploit Bypasses ASLR Protection On 22 CPU Architectures |