CVE-2018-12361

An integer overflow can occur in the SwizzleData code while calculating buffer sizes. The overflowed value is used for subsequent graphics computations when their inputs are not sanitized which results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60, Firefox ESR < 60.1, and Firefox < 61.
References
Link Resource
http://www.securityfocus.com/bid/104558 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1041193 Third Party Advisory VDB Entry
https://bugzilla.mozilla.org/show_bug.cgi?id=1463244 Issue Tracking Permissions Required
https://lists.debian.org/debian-lts-announce/2018/11/msg00011.html Third Party Advisory
https://security.gentoo.org/glsa/201810-01 Mitigation Third Party Advisory
https://security.gentoo.org/glsa/201811-13 Mitigation Third Party Advisory
https://usn.ubuntu.com/3705-1/ Third Party Advisory
https://www.debian.org/security/2018/dsa-4295 Third Party Advisory
https://www.mozilla.org/security/advisories/mfsa2018-15/ Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2018-16/ Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2018-19/ Vendor Advisory
http://www.securityfocus.com/bid/104558 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1041193 Third Party Advisory VDB Entry
https://bugzilla.mozilla.org/show_bug.cgi?id=1463244 Issue Tracking Permissions Required
https://lists.debian.org/debian-lts-announce/2018/11/msg00011.html Third Party Advisory
https://security.gentoo.org/glsa/201810-01 Mitigation Third Party Advisory
https://security.gentoo.org/glsa/201811-13 Mitigation Third Party Advisory
https://usn.ubuntu.com/3705-1/ Third Party Advisory
https://www.debian.org/security/2018/dsa-4295 Third Party Advisory
https://www.mozilla.org/security/advisories/mfsa2018-15/ Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2018-16/ Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2018-19/ Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*

History

21 Nov 2024, 03:45

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/104558 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/104558 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1041193 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1041193 - Third Party Advisory, VDB Entry
References () https://bugzilla.mozilla.org/show_bug.cgi?id=1463244 - Issue Tracking, Permissions Required () https://bugzilla.mozilla.org/show_bug.cgi?id=1463244 - Issue Tracking, Permissions Required
References () https://lists.debian.org/debian-lts-announce/2018/11/msg00011.html - Third Party Advisory () https://lists.debian.org/debian-lts-announce/2018/11/msg00011.html - Third Party Advisory
References () https://security.gentoo.org/glsa/201810-01 - Mitigation, Third Party Advisory () https://security.gentoo.org/glsa/201810-01 - Mitigation, Third Party Advisory
References () https://security.gentoo.org/glsa/201811-13 - Mitigation, Third Party Advisory () https://security.gentoo.org/glsa/201811-13 - Mitigation, Third Party Advisory
References () https://usn.ubuntu.com/3705-1/ - Third Party Advisory () https://usn.ubuntu.com/3705-1/ - Third Party Advisory
References () https://www.debian.org/security/2018/dsa-4295 - Third Party Advisory () https://www.debian.org/security/2018/dsa-4295 - Third Party Advisory
References () https://www.mozilla.org/security/advisories/mfsa2018-15/ - Vendor Advisory () https://www.mozilla.org/security/advisories/mfsa2018-15/ - Vendor Advisory
References () https://www.mozilla.org/security/advisories/mfsa2018-16/ - Vendor Advisory () https://www.mozilla.org/security/advisories/mfsa2018-16/ - Vendor Advisory
References () https://www.mozilla.org/security/advisories/mfsa2018-19/ - Vendor Advisory () https://www.mozilla.org/security/advisories/mfsa2018-19/ - Vendor Advisory

Information

Published : 2018-10-18 13:29

Updated : 2024-11-21 03:45


NVD link : CVE-2018-12361

Mitre link : CVE-2018-12361

CVE.ORG link : CVE-2018-12361


JSON object : View

Products Affected

mozilla

  • firefox
  • thunderbird
  • firefox_esr

canonical

  • ubuntu_linux

debian

  • debian_linux
CWE
CWE-190

Integer Overflow or Wraparound