CVE-2018-12376

Name
CVE-2018-12376
Description
Memory safety bugs present in Firefox 61 and Firefox ESR 60.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 62, Firefox ESR < 60.2, and Thunderbird < 60.2.1.
NVD Severity
high
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Vendor Advisory https://www.mozilla.org/security/advisories/mfsa2018-25/
Vendor Advisory https://www.mozilla.org/security/advisories/mfsa2018-21/
Vendor Advisory https://www.mozilla.org/security/advisories/mfsa2018-20/
Issue Tracking https://bugzilla.mozilla.org/buglist.cgi?bug_id=1469309%2C1469914%2C1450989%2C1480092%2C1480517%2C1481093%2C1478575%2C1471953%2C1473161%2C1466991%2C1468738%2C1483120%2C1467363%2C1472925%2C1466577%2C1467889%2C1480521%2C1478849
Third Party Advisory https://www.debian.org/security/2018/dsa-4287
Third Party Advisory https://usn.ubuntu.com/3793-1/
Third Party Advisory https://usn.ubuntu.com/3761-1/
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:2693
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:2692
Third Party Advisory http://www.securitytracker.com/id/1041610
Third Party Advisory http://www.securityfocus.com/bid/105280
Third Party Advisory https://security.gentoo.org/glsa/201810-01
Third Party Advisory https://www.debian.org/security/2018/dsa-4327
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:3403
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:3458
Mailing List https://lists.debian.org/debian-lts-announce/2018/11/msg00011.html
Third Party Advisory https://security.gentoo.org/glsa/201811-13

Match rules

CPE URI Source package Min version Max version
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:* enterprise_linux_server_tus == None == 7.6
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:* enterprise_linux_server_aus == None == 7.6
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* enterprise_linux_desktop == None == 6.0
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* enterprise_linux_server == None == 6.0
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:* enterprise_linux_server_eus == None == 7.5
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:* enterprise_linux_server_eus == None == 7.6
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* enterprise_linux_workstation == None == 6.0
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* enterprise_linux_server == None == 7.0
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* enterprise_linux_desktop == None == 7.0
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* enterprise_linux_workstation == None == 7.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status