Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-12386

Опубликовано: 18 окт. 2018
Источник: debian

Описание

A vulnerability in register allocation in JavaScript can lead to type confusion, allowing for an arbitrary read and write. This leads to remote code execution inside the sandboxed content process when triggered. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxfixed62.0.3-1package
firefox-esrfixed60.2.2esr-1package

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2018-24/#CVE-2018-12386

Связанные уязвимости

CVSS3: 8.1
ubuntu
около 7 лет назад

A vulnerability in register allocation in JavaScript can lead to type confusion, allowing for an arbitrary read and write. This leads to remote code execution inside the sandboxed content process when triggered. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.

CVSS3: 8.8
redhat
около 7 лет назад

A vulnerability in register allocation in JavaScript can lead to type confusion, allowing for an arbitrary read and write. This leads to remote code execution inside the sandboxed content process when triggered. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.

CVSS3: 8.1
nvd
около 7 лет назад

A vulnerability in register allocation in JavaScript can lead to type confusion, allowing for an arbitrary read and write. This leads to remote code execution inside the sandboxed content process when triggered. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.

CVSS3: 8.1
github
больше 3 лет назад

A vulnerability in register allocation in JavaScript can lead to type confusion, allowing for an arbitrary read and write. This leads to remote code execution inside the sandboxed content process when triggered. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.

CVSS3: 8.1
fstec
около 7 лет назад

Уязвимость веб-браузеров Firefox, Firefox ESR, связанная с ошибками преобразования типов данных, позволяющая нарушителю выполнить произвольный код