CVE-2018-5127

Name
CVE-2018-5127
Description
A buffer overflow can occur when manipulating the SVG "animatedPathSegList" through script. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.7, Firefox ESR < 52.7, and Firefox < 59.
NVD Severity
high
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Vendor Advisory https://www.mozilla.org/security/advisories/mfsa2018-09/
Vendor Advisory https://www.mozilla.org/security/advisories/mfsa2018-07/
Vendor Advisory https://www.mozilla.org/security/advisories/mfsa2018-06/
Issue Tracking https://bugzilla.mozilla.org/show_bug.cgi?id=1430557
Third Party Advisory https://www.debian.org/security/2018/dsa-4155
Third Party Advisory https://www.debian.org/security/2018/dsa-4139
Third Party Advisory https://usn.ubuntu.com/3596-1/
Third Party Advisory https://usn.ubuntu.com/3545-1/
Third Party Advisory https://lists.debian.org/debian-lts-announce/2018/03/msg00029.html
Third Party Advisory https://lists.debian.org/debian-lts-announce/2018/03/msg00010.html
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:0648
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:0647
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:0527
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:0526
Third Party Advisory http://www.securitytracker.com/id/1040514
Third Party Advisory http://www.securityfocus.com/bid/103388
Third Party Advisory https://security.gentoo.org/glsa/201810-01
Third Party Advisory https://security.gentoo.org/glsa/201811-13

Match rules

CPE URI Source package Min version Max version
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:* enterprise_linux_server_aus == None == 7.4
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:* enterprise_linux_server_eus == None == 7.4
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:* enterprise_linux_server_eus == None == 7.5
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* enterprise_linux_server == None == 6.0
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* enterprise_linux_workstation == None == 6.0
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* enterprise_linux_desktop == None == 6.0
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* enterprise_linux_desktop == None == 7.0
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* enterprise_linux_server == None == 7.0
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* enterprise_linux_workstation == None == 7.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status