Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2018-18505

Опубликовано: 05 фев. 2019
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.5
CVSS3: 10

Описание

An earlier fix for an Inter-process Communication (IPC) vulnerability, CVE-2011-3079, added authentication to communication between IPC endpoints and server parents during IPC process creation. This authentication is insufficient for channels created after the IPC process is started, leading to the authentication not being correctly applied to later channels. This could allow for a sandbox escape through IPC channels due to lack of message validation in the listener process. This vulnerability affects Thunderbird < 60.5, Firefox ESR < 60.5, and Firefox < 65.

РелизСтатусПримечание
bionic

released

65.0+build2-0ubuntu0.18.04.1
cosmic

released

65.0+build2-0ubuntu0.18.10.1
devel

released

65.0+build2-0ubuntu1
disco

released

65.0+build2-0ubuntu1
eoan

released

65.0+build2-0ubuntu1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [65.0+build2-0ubuntu0.14.04.1]]
esm-infra/focal

DNE

focal

released

65.0+build2-0ubuntu1
groovy

released

65.0+build2-0ubuntu1
hirsute

released

65.0+build2-0ubuntu1

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
cosmic

DNE

devel

DNE

disco

DNE

eoan

DNE

esm-apps/bionic

ignored

esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

focal

DNE

groovy

DNE

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
cosmic

ignored

end of life
devel

DNE

disco

ignored

end of life
eoan

ignored

end of life
esm-apps/focal

ignored

esm-infra-legacy/trusty

DNE

esm-infra/bionic

ignored

focal

ignored

groovy

ignored

end of life

Показывать по

РелизСтатусПримечание
bionic

DNE

cosmic

ignored

end of life
devel

DNE

disco

ignored

end of life
eoan

ignored

end of life
esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

focal

DNE

groovy

DNE

hirsute

DNE

Показывать по

РелизСтатусПримечание
bionic

released

1:60.5.1+build2-0ubuntu0.18.04.1
cosmic

released

1:60.5.1+build2-0ubuntu0.18.10.1
devel

released

1:60.5.1+build2-0ubuntu1
disco

released

1:60.5.1+build2-0ubuntu1
eoan

released

1:60.5.1+build2-0ubuntu1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [1:60.5.1+build2-0ubuntu0.14.04.1]]
esm-infra/focal

DNE

focal

released

1:60.5.1+build2-0ubuntu1
groovy

released

1:60.5.1+build2-0ubuntu1
hirsute

released

1:60.5.1+build2-0ubuntu1

Показывать по

EPSS

Процентиль: 87%
0.03252
Низкий

7.5 High

CVSS2

10 Critical

CVSS3

Связанные уязвимости

CVSS3: 10
redhat
почти 7 лет назад

An earlier fix for an Inter-process Communication (IPC) vulnerability, CVE-2011-3079, added authentication to communication between IPC endpoints and server parents during IPC process creation. This authentication is insufficient for channels created after the IPC process is started, leading to the authentication not being correctly applied to later channels. This could allow for a sandbox escape through IPC channels due to lack of message validation in the listener process. This vulnerability affects Thunderbird < 60.5, Firefox ESR < 60.5, and Firefox < 65.

CVSS3: 10
nvd
почти 7 лет назад

An earlier fix for an Inter-process Communication (IPC) vulnerability, CVE-2011-3079, added authentication to communication between IPC endpoints and server parents during IPC process creation. This authentication is insufficient for channels created after the IPC process is started, leading to the authentication not being correctly applied to later channels. This could allow for a sandbox escape through IPC channels due to lack of message validation in the listener process. This vulnerability affects Thunderbird < 60.5, Firefox ESR < 60.5, and Firefox < 65.

CVSS3: 10
debian
почти 7 лет назад

An earlier fix for an Inter-process Communication (IPC) vulnerability, ...

CVSS3: 10
github
больше 3 лет назад

An earlier fix for an Inter-process Communication (IPC) vulnerability, CVE-2011-3079, added authentication to communication between IPC endpoints and server parents during IPC process creation. This authentication is insufficient for channels created after the IPC process is started, leading to the authentication not being correctly applied to later channels. This could allow for a sandbox escape through IPC channels due to lack of message validation in the listener process. This vulnerability affects Thunderbird < 60.5, Firefox ESR < 60.5, and Firefox < 65.

CVSS3: 8.3
fstec
почти 7 лет назад

Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с ошибками реализации механизма аутентификации межпроцессного взаимодействия (IPC), позволяющая нарушителю повысить свои привилегии и выйти из изолированной программной среды

EPSS

Процентиль: 87%
0.03252
Низкий

7.5 High

CVSS2

10 Critical

CVSS3

Уязвимость CVE-2018-18505