CVE-2018-5178

Name
CVE-2018-5178
Description
A buffer overflow was found during UTF8 to Unicode string conversion within JavaScript with extremely large amounts of data. This vulnerability requires the use of a malicious or vulnerable legacy extension in order to occur. This vulnerability affects Thunderbird ESR < 52.8, Thunderbird < 52.8, and Firefox ESR < 52.8.
NVD Severity
high
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Vendor Advisory https://www.mozilla.org/security/advisories/mfsa2018-13/
Vendor Advisory https://www.mozilla.org/security/advisories/mfsa2018-12/
Issue Tracking https://bugzilla.mozilla.org/show_bug.cgi?id=1443891
Third Party Advisory https://www.debian.org/security/2018/dsa-4209
Third Party Advisory https://www.debian.org/security/2018/dsa-4199
Third Party Advisory https://usn.ubuntu.com/3660-1/
Mailing List https://lists.debian.org/debian-lts-announce/2018/05/msg00013.html
Mailing List https://lists.debian.org/debian-lts-announce/2018/05/msg00007.html
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:1726
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:1725
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:1415
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:1414
Third Party Advisory http://www.securitytracker.com/id/1040898
Third Party Advisory http://www.securityfocus.com/bid/104138
Third Party Advisory https://security.gentoo.org/glsa/201810-01
Third Party Advisory https://security.gentoo.org/glsa/201811-13

Match rules

CPE URI Source package Min version Max version
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* debian_linux == None == 8.0
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* debian_linux == None == 9.0
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* debian_linux == None == 7.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status