9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.38 Low
EPSS
Percentile
97.2%
Severity: Critical
Date : 2018-03-24
CVE-ID : CVE-2018-5125 CVE-2018-5127 CVE-2018-5129 CVE-2018-5144
CVE-2018-5145 CVE-2018-5146
Package : thunderbird
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-663
The package thunderbird before version 52.7.0-1 is vulnerable to
multiple issues including arbitrary code execution and access
restriction bypass.
Upgrade to 52.7.0-1.
The problems have been fixed upstream in version 52.7.0.
None.
Various memory safety bugs have been found in Thunderbird < 52.7.0 and
Firefox < 59.0, some of them presenting evidence of memory corruption.
Mozilla presumes that with enough effort some of these could be
exploited to run arbitrary code.
A buffer overflow can occur in Thunderbird < 52.7.0 when manipulating
the SVG animatedPathSegList through script. This results in a
potentially exploitable crash.
A lack of parameter validation on IPC messages results in a potential
out-of-bounds write in Thunderbird < 52.7.0, through malformed IPC
messages. This can potentially allow for sandbox escape through memory
corruption in the parent process.
An integer overflow can occur during conversion of text to some Unicode
character sets in Thunderbird < 52.7.0, due to an unchecked length
parameter.
Various memory safety bugs have been found in Thunderbird < 52.7.0,
some of them presenting evidence of memory corruption. Mozilla presumes
that with enough effort some of these could be exploited to run
arbitrary code.
An out of bounds memory write vulnerability has been discovered in
libvorbis before 1.3.6 while processing Vorbis audio data related to
codebooks that are not an exact divisor of the partition size.
A remote attacker might be able to bypass the sandbox and execute
arbitrary code on the affected host via a crafted page containing an
SVG object, a Vorbis audio file or some unicode characters. These
issues can generally not be exploited through email because scripting
is then disabled, but can be exploited in browser-like contexts.
https://www.mozilla.org/en-US/security/advisories/mfsa2018-09/
https://www.mozilla.org/en-US/security/advisories/mfsa2018-09/#CVE-2018-5125
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1416529%2C1434580%2C1434384%2C1437450%2C1437507%2C1426988%2C1438425%2C1324042%2C1437087%2C1443865%2C1425520
https://www.mozilla.org/en-US/security/advisories/mfsa2018-09/#CVE-2018-5127
https://bugzilla.mozilla.org/show_bug.cgi?id=1430557
https://www.mozilla.org/en-US/security/advisories/mfsa2018-09/#CVE-2018-5129
https://bugzilla.mozilla.org/show_bug.cgi?id=1428947
https://www.mozilla.org/en-US/security/advisories/mfsa2018-09/#CVE-2018-5144
https://bugzilla.mozilla.org/show_bug.cgi?id=1440926
https://www.mozilla.org/en-US/security/advisories/mfsa2018-09/#CVE-2018-5145
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1261175%2C1348955
https://github.com/xiph/vorbis/commit/667ceb4aab60c1f74060143bb24e5f427b3cce5f
http://seclists.org/oss-sec/2018/q1/243
https://security.archlinux.org/CVE-2018-5125
https://security.archlinux.org/CVE-2018-5127
https://security.archlinux.org/CVE-2018-5129
https://security.archlinux.org/CVE-2018-5144
https://security.archlinux.org/CVE-2018-5145
https://security.archlinux.org/CVE-2018-5146
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ArchLinux | any | any | thunderbird | < 52.7.0-1 | UNKNOWN |
seclists.org/oss-sec/2018/q1/243
bugzilla.mozilla.org/buglist.cgi?bug_id=1261175%2C1348955
bugzilla.mozilla.org/buglist.cgi?bug_id=1416529%2C1434580%2C1434384%2C1437450%2C1437507%2C1426988%2C1438425%2C1324042%2C1437087%2C1443865%2C1425520
bugzilla.mozilla.org/show_bug.cgi?id=1428947
bugzilla.mozilla.org/show_bug.cgi?id=1430557
bugzilla.mozilla.org/show_bug.cgi?id=1440926
github.com/xiph/vorbis/commit/667ceb4aab60c1f74060143bb24e5f427b3cce5f
security.archlinux.org/AVG-663
security.archlinux.org/CVE-2018-5125
security.archlinux.org/CVE-2018-5127
security.archlinux.org/CVE-2018-5129
security.archlinux.org/CVE-2018-5144
security.archlinux.org/CVE-2018-5145
security.archlinux.org/CVE-2018-5146
www.mozilla.org/en-US/security/advisories/mfsa2018-09/
www.mozilla.org/en-US/security/advisories/mfsa2018-09/#CVE-2018-5125
www.mozilla.org/en-US/security/advisories/mfsa2018-09/#CVE-2018-5127
www.mozilla.org/en-US/security/advisories/mfsa2018-09/#CVE-2018-5129
www.mozilla.org/en-US/security/advisories/mfsa2018-09/#CVE-2018-5144
www.mozilla.org/en-US/security/advisories/mfsa2018-09/#CVE-2018-5145
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.38 Low
EPSS
Percentile
97.2%