CVE-2018-5163

If a malicious attacker has used another vulnerability to gain full control over a content process, they may be able to replace the alternate data resources stored in the JavaScript Start-up Bytecode Cache (JSBC) for other JavaScript code. If the parent process then runs this replaced code, the executed script would be run with the parent process' privileges, escaping the sandbox on content processes. This vulnerability affects Firefox < 60.
References
Link Resource
http://www.securityfocus.com/bid/104139 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1040896 Third Party Advisory VDB Entry
https://bugzilla.mozilla.org/show_bug.cgi?id=1426353 Issue Tracking Permissions Required Vendor Advisory
https://usn.ubuntu.com/3645-1/ Third Party Advisory
https://www.mozilla.org/security/advisories/mfsa2018-11/ Vendor Advisory
http://www.securityfocus.com/bid/104139 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1040896 Third Party Advisory VDB Entry
https://bugzilla.mozilla.org/show_bug.cgi?id=1426353 Issue Tracking Permissions Required Vendor Advisory
https://usn.ubuntu.com/3645-1/ Third Party Advisory
https://www.mozilla.org/security/advisories/mfsa2018-11/ Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*

Configuration 2 (hide)

cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:08

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/104139 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/104139 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1040896 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1040896 - Third Party Advisory, VDB Entry
References () https://bugzilla.mozilla.org/show_bug.cgi?id=1426353 - Issue Tracking, Permissions Required, Vendor Advisory () https://bugzilla.mozilla.org/show_bug.cgi?id=1426353 - Issue Tracking, Permissions Required, Vendor Advisory
References () https://usn.ubuntu.com/3645-1/ - Third Party Advisory () https://usn.ubuntu.com/3645-1/ - Third Party Advisory
References () https://www.mozilla.org/security/advisories/mfsa2018-11/ - Vendor Advisory () https://www.mozilla.org/security/advisories/mfsa2018-11/ - Vendor Advisory

Information

Published : 2018-06-11 21:29

Updated : 2024-11-21 04:08


NVD link : CVE-2018-5163

Mitre link : CVE-2018-5163

CVE.ORG link : CVE-2018-5163


JSON object : View

Products Affected

canonical

  • ubuntu_linux

mozilla

  • firefox
CWE
CWE-281

Improper Preservation of Permissions