If a user saved passwords before Firefox 58 and then later set a master password, an unencrypted copy of these passwords is still accessible. This is because the older stored password file was not deleted when the data was copied to a new format starting in Firefox 58. The new master password is added only on the new file. This could allow the exposure of stored password data outside of user expectations. This vulnerability affects Firefox < 62, Firefox ESR < 60.2.1, and Thunderbird < 60.2.1.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 03:45
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/105276 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1041610 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1041701 - Third Party Advisory, VDB Entry | |
References | () https://access.redhat.com/errata/RHSA-2018:2834 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:2835 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:3403 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:3458 - Third Party Advisory | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=1475775 - Exploit, Issue Tracking, Vendor Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2018/11/msg00011.html - Mailing List, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201810-01 - Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201811-13 - Third Party Advisory | |
References | () https://usn.ubuntu.com/3761-1/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3793-1/ - Third Party Advisory | |
References | () https://www.debian.org/security/2018/dsa-4304 - Third Party Advisory | |
References | () https://www.debian.org/security/2018/dsa-4327 - Third Party Advisory | |
References | () https://www.mozilla.org/security/advisories/mfsa2018-20/ - Vendor Advisory | |
References | () https://www.mozilla.org/security/advisories/mfsa2018-23/ - Vendor Advisory | |
References | () https://www.mozilla.org/security/advisories/mfsa2018-25/ - Vendor Advisory |
Information
Published : 2018-10-18 13:29
Updated : 2024-11-21 03:45
NVD link : CVE-2018-12383
Mitre link : CVE-2018-12383
CVE.ORG link : CVE-2018-12383
JSON object : View
Products Affected
redhat
- enterprise_linux_workstation
- enterprise_linux_server_tus
- enterprise_linux_server
- enterprise_linux_server_eus
- enterprise_linux_desktop
- enterprise_linux_server_aus
mozilla
- thunderbird
- firefox
- firefox_esr
debian
- debian_linux
canonical
- ubuntu_linux
CWE
CWE-522
Insufficiently Protected Credentials