CVE-2018-5150

Name
CVE-2018-5150
Description
Memory safety bugs were reported in Firefox 59, Firefox ESR 52.7, and Thunderbird 52.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 52.8, Thunderbird ESR < 52.8, Firefox < 60, and Firefox ESR < 52.8.
NVD Severity
high
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Vendor Advisory https://www.mozilla.org/security/advisories/mfsa2018-13/
Vendor Advisory https://www.mozilla.org/security/advisories/mfsa2018-12/
Vendor Advisory https://www.mozilla.org/security/advisories/mfsa2018-11/
Issue Tracking https://bugzilla.mozilla.org/buglist.cgi?bug_id=1388020%2C1433609%2C1409440%2C1448705%2C1451376%2C1452202%2C1444668%2C1393367%2C1411415%2C1426129
Third Party Advisory https://www.debian.org/security/2018/dsa-4209
Third Party Advisory https://www.debian.org/security/2018/dsa-4199
Third Party Advisory https://usn.ubuntu.com/3660-1/
Third Party Advisory https://usn.ubuntu.com/3645-1/
Mailing List https://lists.debian.org/debian-lts-announce/2018/05/msg00013.html
Mailing List https://lists.debian.org/debian-lts-announce/2018/05/msg00007.html
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:1726
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:1725
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:1415
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:1414
Third Party Advisory http://www.securitytracker.com/id/1040896
Third Party Advisory http://www.securityfocus.com/bid/104136
Third Party Advisory https://usn.ubuntu.com/3688-1/
Third Party Advisory https://security.gentoo.org/glsa/201810-01
Third Party Advisory https://security.gentoo.org/glsa/201811-13

Match rules

CPE URI Source package Min version Max version
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* debian_linux == None == 9.0
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* debian_linux == None == 7.0
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* debian_linux == None == 8.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status