ID

VAR-201702-0605


CVE

CVE-2017-5928


TITLE

plural Web Implemented in browser W3C High Resolution Time API In AnC Attacked vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2017-002232

DESCRIPTION

The W3C High Resolution Time API, as implemented in various web browsers, does not consider that memory-reference times can be measured by a performance.now "Time to Tick" approach even with the https://bugzilla.mozilla.org/show_bug.cgi?id=1167489#c9 protection mechanism in place, which makes it easier for remote attackers to conduct AnC attacks via crafted JavaScript code. W3CHighResolutionTimeAPI is a set of JavaScript interfaces for the current time format that provides sub-millisecond resolution for web applications. A security vulnerability exists in W3CHighResolutionTimeAPI. An attacker could exploit the vulnerability to implement an AnC attack with specially crafted JavaScript code. W3C High Resolution Time API is prone to a security vulnerability. Attackers can exploit this issue to bypass certain security restrictions and gain access to some sensitive information. This may aid in further attacks

Trust: 2.43

sources: NVD: CVE-2017-5928 // JVNDB: JVNDB-2017-002232 // CNVD: CNVD-2017-02599 // BID: 97036

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2017-02599

AFFECTED PRODUCTS

vendor:w3model:high resolution time apiscope:eqversion: -

Trust: 1.0

vendor:w3cmodel:high resolution timescope: - version: -

Trust: 0.8

vendor:w3cmodel:high resolution time apiscope: - version: -

Trust: 0.6

vendor:w3cmodel:high resolution time apiscope:eqversion: -

Trust: 0.6

vendor:w3cmodel:high resolution time apiscope:eqversion:0

Trust: 0.3

sources: CNVD: CNVD-2017-02599 // BID: 97036 // JVNDB: JVNDB-2017-002232 // CNNVD: CNNVD-201702-923 // NVD: CVE-2017-5928

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-5928
value: LOW

Trust: 1.0

NVD: CVE-2017-5928
value: LOW

Trust: 0.8

CNVD: CNVD-2017-02599
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201702-923
value: LOW

Trust: 0.6

nvd@nist.gov: CVE-2017-5928
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2017-02599
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2017-5928
baseSeverity: LOW
baseScore: 3.7
vectorString: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.2
impactScore: 1.4
version: 3.1

Trust: 1.0

NVD: CVE-2017-5928
baseSeverity: LOW
baseScore: 3.7
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2017-02599 // JVNDB: JVNDB-2017-002232 // CNNVD: CNNVD-201702-923 // NVD: CVE-2017-5928

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-361

Trust: 0.8

sources: JVNDB: JVNDB-2017-002232 // NVD: CVE-2017-5928

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201702-923

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201702-923

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-002232

PATCH

title:High Resolution Time Level 3url:https://www.w3.org/TR/hr-time-3/

Trust: 0.8

sources: JVNDB: JVNDB-2017-002232

EXTERNAL IDS

db:NVDid:CVE-2017-5928

Trust: 3.3

db:BIDid:97036

Trust: 2.7

db:JVNDBid:JVNDB-2017-002232

Trust: 0.8

db:CNVDid:CNVD-2017-02599

Trust: 0.6

db:CNNVDid:CNNVD-201702-923

Trust: 0.6

sources: CNVD: CNVD-2017-02599 // BID: 97036 // JVNDB: JVNDB-2017-002232 // CNNVD: CNNVD-201702-923 // NVD: CVE-2017-5928

REFERENCES

url:http://www.cs.vu.nl/~herbertb/download/papers/anc_ndss17.pdf

Trust: 2.2

url:https://www.vusec.net/projects/anc

Trust: 1.6

url:http://www.securityfocus.com/bid/97036

Trust: 1.6

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-5928

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-5928

Trust: 0.8

url:http://www.securityfocus.com/bid/97036/info

Trust: 0.8

url:https://www.vusec.net/projects/anc/

Trust: 0.8

url:https://www.w3.org/tr/hr-time-3/

Trust: 0.3

sources: CNVD: CNVD-2017-02599 // BID: 97036 // JVNDB: JVNDB-2017-002232 // CNNVD: CNNVD-201702-923 // NVD: CVE-2017-5928

CREDITS

VUSec

Trust: 0.3

sources: BID: 97036

SOURCES

db:CNVDid:CNVD-2017-02599
db:BIDid:97036
db:JVNDBid:JVNDB-2017-002232
db:CNNVDid:CNNVD-201702-923
db:NVDid:CVE-2017-5928

LAST UPDATE DATE

2025-04-20T23:27:28.207000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-02599date:2017-03-15T00:00:00
db:BIDid:97036date:2017-03-29T04:01:00
db:JVNDBid:JVNDB-2017-002232date:2017-04-05T00:00:00
db:CNNVDid:CNNVD-201702-923date:2019-10-23T00:00:00
db:NVDid:CVE-2017-5928date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:CNVDid:CNVD-2017-02599date:2017-03-10T00:00:00
db:BIDid:97036date:2017-02-27T00:00:00
db:JVNDBid:JVNDB-2017-002232date:2017-04-05T00:00:00
db:CNNVDid:CNNVD-201702-923date:2017-02-28T00:00:00
db:NVDid:CVE-2017-5928date:2017-02-27T07:59:00.270