Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-5129

Опубликовано: 11 июн. 2018
Источник: debian
EPSS Низкий

Описание

A lack of parameter validation on IPC messages results in a potential out-of-bounds write through malformed IPC messages. This can potentially allow for sandbox escape through memory corruption in the parent process. This vulnerability affects Thunderbird < 52.7, Firefox ESR < 52.7, and Firefox < 59.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxfixed59.0-1package
firefox-esrfixed52.7.0esr-1package
thunderbirdfixed1:52.7.0-1package

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2018-07/

  • https://www.mozilla.org/en-US/security/advisories/mfsa2018-06/

  • https://www.mozilla.org/en-US/security/advisories/mfsa2018-09/

EPSS

Процентиль: 84%
0.02394
Низкий

Связанные уязвимости

CVSS3: 8.6
ubuntu
около 7 лет назад

A lack of parameter validation on IPC messages results in a potential out-of-bounds write through malformed IPC messages. This can potentially allow for sandbox escape through memory corruption in the parent process. This vulnerability affects Thunderbird < 52.7, Firefox ESR < 52.7, and Firefox < 59.

CVSS3: 8.6
redhat
больше 7 лет назад

A lack of parameter validation on IPC messages results in a potential out-of-bounds write through malformed IPC messages. This can potentially allow for sandbox escape through memory corruption in the parent process. This vulnerability affects Thunderbird < 52.7, Firefox ESR < 52.7, and Firefox < 59.

CVSS3: 8.6
nvd
около 7 лет назад

A lack of parameter validation on IPC messages results in a potential out-of-bounds write through malformed IPC messages. This can potentially allow for sandbox escape through memory corruption in the parent process. This vulnerability affects Thunderbird < 52.7, Firefox ESR < 52.7, and Firefox < 59.

CVSS3: 8.6
github
около 3 лет назад

A lack of parameter validation on IPC messages results in a potential out-of-bounds write through malformed IPC messages. This can potentially allow for sandbox escape through memory corruption in the parent process. This vulnerability affects Thunderbird < 52.7, Firefox ESR < 52.7, and Firefox < 59.

CVSS3: 8.6
fstec
больше 7 лет назад

Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с отсутствием проверки параметров в IPC-сообщениях, позволяющая нарушителю оказать воздействие на целостность данных

EPSS

Процентиль: 84%
0.02394
Низкий