Vulnerability Details : CVE-2018-5095
An integer overflow vulnerability in the Skia library when allocating memory for edge builders on some systems with at least 8 GB of RAM. This results in the use of uninitialized memory, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.6, Firefox ESR < 52.6, and Firefox < 58.
Vulnerability category: Overflow
Exploit prediction scoring system (EPSS) score for CVE-2018-5095
Probability of exploitation activity in the next 30 days: 0.69%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 78 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2018-5095
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
[email protected] |
9.8
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
[email protected] |
CWE ids for CVE-2018-5095
-
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.Assigned by: [email protected] (Primary)
-
The product uses or accesses a resource that has not been initialized.Assigned by: [email protected] (Primary)
References for CVE-2018-5095
-
https://www.debian.org/security/2018/dsa-4102
Third Party Advisory
-
https://www.debian.org/security/2018/dsa-4096
Third Party Advisory
-
https://www.mozilla.org/security/advisories/mfsa2018-04/
Vendor Advisory
-
https://www.mozilla.org/security/advisories/mfsa2018-03/
Vendor Advisory
-
http://www.securityfocus.com/bid/102783
Third Party Advisory;VDB Entry
-
https://lists.debian.org/debian-lts-announce/2018/01/msg00036.html
Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2018/01/msg00030.html
Third Party Advisory
-
https://bugzilla.mozilla.org/show_bug.cgi?id=1418447
Issue Tracking;Permissions Required;Vendor Advisory
-
https://access.redhat.com/errata/RHSA-2018:0262
Third Party Advisory
-
https://www.mozilla.org/security/advisories/mfsa2018-02/
Vendor Advisory
-
https://usn.ubuntu.com/3544-1/
Third Party Advisory
-
http://www.securitytracker.com/id/1040270
Third Party Advisory;VDB Entry
-
https://access.redhat.com/errata/RHSA-2018:0122
Third Party Advisory
Products affected by CVE-2018-5095
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*