CVE-2018-5146

Name
CVE-2018-5146
Description
An out of bounds memory write while processing Vorbis audio data was reported through the Pwn2Own contest. This vulnerability affects Firefox < 59.0.1, Firefox ESR < 52.7.2, and Thunderbird < 52.7.
NVD Severity
high
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Vendor Advisory https://www.mozilla.org/security/advisories/mfsa2018-09/
Vendor Advisory https://www.mozilla.org/security/advisories/mfsa2018-08/
Issue Tracking https://bugzilla.mozilla.org/show_bug.cgi?id=1446062
Third Party Advisory https://www.debian.org/security/2018/dsa-4155
Third Party Advisory https://www.debian.org/security/2018/dsa-4143
Third Party Advisory https://www.debian.org/security/2018/dsa-4140
Third Party Advisory https://usn.ubuntu.com/3604-1/
Third Party Advisory https://usn.ubuntu.com/3599-1/
Third Party Advisory https://usn.ubuntu.com/3545-1/
Mailing List https://lists.debian.org/debian-lts-announce/2018/04/msg00033.html
Mailing List https://lists.debian.org/debian-lts-announce/2018/03/msg00029.html
Mailing List https://lists.debian.org/debian-lts-announce/2018/03/msg00022.html
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:1058
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:0649
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:0648
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:0647
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:0549
Third Party Advisory http://www.securitytracker.com/id/1040544
Third Party Advisory http://www.securityfocus.com/bid/103432
Third Party Advisory https://security.gentoo.org/glsa/201811-13

Match rules

CPE URI Source package Min version Max version
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:* enterprise_linux_server_tus == None == 7.4
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:* enterprise_linux_server_tus == None == 7.6
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* enterprise_linux_server == None == 6.0
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:* enterprise_linux_server_eus == None == 7.4
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:* enterprise_linux_server_eus == None == 7.6
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* enterprise_linux_workstation == None == 6.0
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* enterprise_linux_desktop == None == 7.0
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* enterprise_linux_server == None == 7.0
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* enterprise_linux_workstation == None == 7.0
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:* enterprise_linux_server_aus == None == 7.4
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* enterprise_linux_desktop == None == 6.0
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:* enterprise_linux_server_aus == None == 7.6
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:* enterprise_linux_server_eus == None == 7.5

Vulnerable and fixed packages

Source package Branch Version Maintainer Status