9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.124 Low
EPSS
Percentile
95.3%
Severity: Critical
Date : 2018-06-27
CVE-ID : CVE-2018-5186 CVE-2018-5187 CVE-2018-5188 CVE-2018-12356
CVE-2018-12358 CVE-2018-12359 CVE-2018-12360 CVE-2018-12361
CVE-2018-12362 CVE-2018-12363 CVE-2018-12364 CVE-2018-12365
CVE-2018-12366 CVE-2018-12367 CVE-2018-12369 CVE-2018-12370
CVE-2018-12371
Package : firefox
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-727
The package firefox before version 61.0-1 is vulnerable to multiple
issues including arbitrary code execution, cross-site request forgery,
same-origin policy bypass, access restriction bypass and information
disclosure.
Upgrade to 61.0-1.
The problems have been fixed upstream in version 61.0.
None.
Several memory safety bugs have been found in Firefox before 61.0. Some
of these bugs showed evidence of memory corruption and Mozilla presumes
that with enough effort some of these could be exploited to run
arbitrary code.
Several memory safety bugs have been found in Firefox before 61.0. Some
of these bugs showed evidence of memory corruption and Mozilla presumes
that with enough effort some of these could be exploited to run
arbitrary code.
Several memory safety bugs have been found in Firefox before 61.0. Some
of these bugs showed evidence of memory corruption and Mozilla presumes
that with enough effort some of these could be exploited to run
arbitrary code.
An issue was discovered in password-store.sh in pass in Simple Password
Store 1.7 through 1.7.1. The signature verification routine parses the
output of GnuPG with an incomplete regular expression, which allows
remote attackers to spoof file signatures on configuration files and
extensions scripts. Modifying the configuration file allows the
attacker to inject additional encryption keys under their control,
thereby disclosing passwords to the attacker. Modifying the extension
scripts allows the attacker arbitrary code execution.
Service workers in Firefox before 61.0 can use redirection to avoid the
tainting of cross-origin resources in some instances, allowing a
malicious site to read responses which are supposed to be opaque.
A buffer overflow can occur in Firefox before 61.0 when rendering
canvas content while adjusting the height and width of the <canvas>
element dynamically, causing data to be written outside of the
currently computed boundaries. This results in a potentially
exploitable crash.
A use-after-free vulnerability can occur in Firefox before 61.0 when
deleting an input element during a mutation event handler triggered by
focusing that element. This results in a potentially exploitable crash.
An integer overflow can occur in Firefox before 61.0 in the SwizzleData
code while calculating buffer sizes. The overflowed value is used for
subsequent graphics computations when their inputs are not sanitized
which results in a potentially exploitable crash.
An integer overflow can occur in Firefox before 61.0 during graphics
operations done by the Supplemental Streaming SIMD Extensions 3 (SSSE3)
scaler, resulting in a potentially exploitable crash.
A use-after-free vulnerability can occur in Firefox before 61.0 when
script uses mutation events to move DOM nodes between documents,
resulting in the old document that held the node being freed but the
node still having a pointer referencing it. This results in a
potentially exploitable crash.
A security issue has been found in Firefox before 61.0 where NPAPI
plugins, such as Adobe Flash, can send non-simple cross-origin
requests, bypassing CORS by making a same-origin POST that does a 307
redirect to the target site. This allows for a malicious site to engage
in cross-site request forgery (CSRF) attacks.
A security issue has been found in Firefox before 61.0 where a
compromised IPC child process can escape the content sandbox and list
the names of arbitrary files on the file system without user consent or
interaction. This could result in exposure of private local files.
An invalid grid size during QCMS (color profile) transformations can
result in the out-of-bounds read interpreted as a float value, in
Firefox before 61.0. This could leak private data into the output.
A security issue has been found in Firefox before 61.0. In the previous
mitigations for Spectre, the resolution or precision of various methods
was reduced to counteract the ability to measure precise time
intervals. In that work, PerformanceNavigationTiming was not adjusted
but it was found that it could be used as a precision timer.
WebExtensions bundled with embedded experiments were not correctly
checked for proper authorization before Firefox 61.0. This allowed a
malicious WebExtension to gain full browser permissions.
In the Reader View of Firefox before 61.0, SameSite cookie protections
are not checked on exiting. This allows for a payload to be triggered
when Reader View is exited if loaded by a malicious site while Reader
mode is active, bypassing CSRF protections.
An integer overflow vulnerability has been found in the Skia library
shipped with Firefox before 61.0, when allocating memory for edge
builders on some systems with at least 16 GB of RAM. This results in
the use of uninitialized memory, resulting in a potentially exploitable
crash.
A remote attacker can access sensitive information, bypass various
security mechanisms and execute arbitrary code on the affected host.
https://www.mozilla.org/en-US/security/advisories/mfsa2018-15
https://www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-5186
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1464872%2C1463329%2C1419373%2C1412882%2C1413033%2C1444673%2C1454448%2C1453505%2C1438671
https://www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-5187
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1461324%2C1414829%2C1395246%2C1467938%2C1461619%2C1425930%2C1438556%2C1454285%2C1459568%2C1463884
https://www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-5188
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1456189%2C1456975%2C1465898%2C1392739%2C1451297%2C1464063%2C1437842%2C1442722%2C1452576%2C1450688%2C1458264%2C1458270%2C1465108%2C1464829%2C1464079%2C1463494%2C1458048
https://neopg.io/blog/pass-signature-spoof/
https://marc.info/?l=oss-security&m=152901317028506
https://github.com/zx2c4/password-store/commit/8683403b77f59c56fcb1f05c61ab33b9fd61a30d
https://www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12358
https://bugzilla.mozilla.org/show_bug.cgi?id=1467852
https://www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12359
https://bugzilla.mozilla.org/show_bug.cgi?id=1459162
https://www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12360
https://bugzilla.mozilla.org/show_bug.cgi?id=1459693
https://www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12361
https://bugzilla.mozilla.org/show_bug.cgi?id=1463244
https://www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12362
https://bugzilla.mozilla.org/show_bug.cgi?id=1452375
https://www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12363
https://bugzilla.mozilla.org/show_bug.cgi?id=1464784
https://www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12364
https://bugzilla.mozilla.org/show_bug.cgi?id=1436241
https://www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12365
https://bugzilla.mozilla.org/show_bug.cgi?id=1459206
https://www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12366
https://bugzilla.mozilla.org/show_bug.cgi?id=1464039
https://www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12367
https://bugzilla.mozilla.org/show_bug.cgi?id=1462891
https://www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12369
https://bugzilla.mozilla.org/show_bug.cgi?id=1454909
https://www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12370
https://bugzilla.mozilla.org/show_bug.cgi?id=1456652
https://www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12371
https://bugzilla.mozilla.org/show_bug.cgi?id=1465686
https://security.archlinux.org/CVE-2018-5186
https://security.archlinux.org/CVE-2018-5187
https://security.archlinux.org/CVE-2018-5188
https://security.archlinux.org/CVE-2018-12356
https://security.archlinux.org/CVE-2018-12358
https://security.archlinux.org/CVE-2018-12359
https://security.archlinux.org/CVE-2018-12360
https://security.archlinux.org/CVE-2018-12361
https://security.archlinux.org/CVE-2018-12362
https://security.archlinux.org/CVE-2018-12363
https://security.archlinux.org/CVE-2018-12364
https://security.archlinux.org/CVE-2018-12365
https://security.archlinux.org/CVE-2018-12366
https://security.archlinux.org/CVE-2018-12367
https://security.archlinux.org/CVE-2018-12369
https://security.archlinux.org/CVE-2018-12370
https://security.archlinux.org/CVE-2018-12371
bugzilla.mozilla.org/buglist.cgi?bug_id=1456189%2C1456975%2C1465898%2C1392739%2C1451297%2C1464063%2C1437842%2C1442722%2C1452576%2C1450688%2C1458264%2C1458270%2C1465108%2C1464829%2C1464079%2C1463494%2C1458048
bugzilla.mozilla.org/buglist.cgi?bug_id=1461324%2C1414829%2C1395246%2C1467938%2C1461619%2C1425930%2C1438556%2C1454285%2C1459568%2C1463884
bugzilla.mozilla.org/buglist.cgi?bug_id=1464872%2C1463329%2C1419373%2C1412882%2C1413033%2C1444673%2C1454448%2C1453505%2C1438671
bugzilla.mozilla.org/show_bug.cgi?id=1436241
bugzilla.mozilla.org/show_bug.cgi?id=1452375
bugzilla.mozilla.org/show_bug.cgi?id=1454909
bugzilla.mozilla.org/show_bug.cgi?id=1456652
bugzilla.mozilla.org/show_bug.cgi?id=1459162
bugzilla.mozilla.org/show_bug.cgi?id=1459206
bugzilla.mozilla.org/show_bug.cgi?id=1459693
bugzilla.mozilla.org/show_bug.cgi?id=1462891
bugzilla.mozilla.org/show_bug.cgi?id=1463244
bugzilla.mozilla.org/show_bug.cgi?id=1464039
bugzilla.mozilla.org/show_bug.cgi?id=1464784
bugzilla.mozilla.org/show_bug.cgi?id=1465686
bugzilla.mozilla.org/show_bug.cgi?id=1467852
github.com/zx2c4/password-store/commit/8683403b77f59c56fcb1f05c61ab33b9fd61a30d
marc.info/?l=oss-security&m=152901317028506
neopg.io/blog/pass-signature-spoof/
security.archlinux.org/AVG-727
security.archlinux.org/CVE-2018-12356
security.archlinux.org/CVE-2018-12358
security.archlinux.org/CVE-2018-12359
security.archlinux.org/CVE-2018-12360
security.archlinux.org/CVE-2018-12361
security.archlinux.org/CVE-2018-12362
security.archlinux.org/CVE-2018-12363
security.archlinux.org/CVE-2018-12364
security.archlinux.org/CVE-2018-12365
security.archlinux.org/CVE-2018-12366
security.archlinux.org/CVE-2018-12367
security.archlinux.org/CVE-2018-12369
security.archlinux.org/CVE-2018-12370
security.archlinux.org/CVE-2018-12371
security.archlinux.org/CVE-2018-5186
security.archlinux.org/CVE-2018-5187
security.archlinux.org/CVE-2018-5188
www.mozilla.org/en-US/security/advisories/mfsa2018-15
www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12358
www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12359
www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12360
www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12361
www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12362
www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12363
www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12364
www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12365
www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12366
www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12367
www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12369
www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12370
www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12371
www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-5186
www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-5187
www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-5188
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.124 Low
EPSS
Percentile
95.3%