Vulnerability Details : CVE-2018-12361
An integer overflow can occur in the SwizzleData code while calculating buffer sizes. The overflowed value is used for subsequent graphics computations when their inputs are not sanitized which results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60, Firefox ESR < 60.1, and Firefox < 61.
Vulnerability category: Overflow
Products affected by CVE-2018-12361
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-12361
0.45%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 75 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-12361
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST | |
8.8
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2018-12361
-
The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-12361
-
http://www.securitytracker.com/id/1041193
Mozilla Firefox Multiple Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks, Bypass Security Restrictions, Obtain Potentially Sensitive Information, and Execute Arbitrary Code - SecurityThird Party Advisory;VDB Entry
-
https://security.gentoo.org/glsa/201811-13
Mozilla Thunderbird: Multiple vulnerabilities (GLSA 201811-13) — Gentoo securityMitigation;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2018/11/msg00011.html
[SECURITY] [DLA 1575-1] thunderbird security updateThird Party Advisory
-
https://security.gentoo.org/glsa/201810-01
Mozilla Firefox: Multiple vulnerabilities (GLSA 201810-01) — Gentoo securityMitigation;Third Party Advisory
-
https://www.mozilla.org/security/advisories/mfsa2018-15/
Security vulnerabilities fixed in Firefox 61 — MozillaVendor Advisory
-
https://www.debian.org/security/2018/dsa-4295
Debian -- Security Information -- DSA-4295-1 thunderbirdThird Party Advisory
-
http://www.securityfocus.com/bid/104558
Mozilla Firefox and Firefox ESR CVE-2018-12361 Integer Overflow VulnerabilityThird Party Advisory;VDB Entry
-
https://www.mozilla.org/security/advisories/mfsa2018-19/
Security vulnerabilities fixed in Thunderbird 60 — MozillaVendor Advisory
-
https://bugzilla.mozilla.org/show_bug.cgi?id=1463244
1463244 - (CVE-2018-12361) Buffer Overflow in gfx::SwizzleCopyIssue Tracking;Permissions Required
-
https://usn.ubuntu.com/3705-1/
USN-3705-1: Firefox vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://www.mozilla.org/security/advisories/mfsa2018-16/
Security vulnerabilities fixed in Firefox ESR 60.1 — MozillaVendor Advisory
Jump to