Versions of Mozilla Firefox ESR earlier than 60.1 are unpatched for the following vulnerabilities :
An out-of-bounds read flaw exists in the ‘qcms_modular_transform_data()’ function in ‘chain.c’ that is triggered when handling an invalid grid size during QCMS transformations. This may allow a context-dependent attacker to potentially disclose memory contents.
A flaw exists in ‘dom/performance/PerformanceNavigationTiming.cpp’ that is triggered as the Navigation APIs can be used as a precision timer. This may allow a context-dependent attacker to conduct timing attacks.
A flaw exists in the ‘nsLocalFile::IsExecutable()’ function in ‘xpcom/io/nsLocalFileWin.cpp’, as ‘settingcontent-ms’ is not recognized as an executable file extension. This may allow a context-dependent attacker to more easily trick a user into opening a malicious file without a warning prompt being presented.
A flaw exists in the WebExtension that is triggered as embedded experiments are not properly checked. This may allow a context-dependent attacker to bypass authorization mechanisms.
An integer overflow flaw exists that is triggered as uninitialized memory is used when allocating memory for edge builders. This may allow a context-dependent attacker to potentially execute arbitrary code.
A flaw exists in the ‘ContentParent::RecvGetFilesRequest()’ function in ‘dom/ipc/ContentParent.cpp’. Combined with another vulnerability this may allow a context-dependent attacker to bypass the sandbox and enumerate file names.
An overflow condition exists in the ‘CanvasRenderingContext2D::SetDimensions()’ function in ‘dom/canvas/CanvasRenderingContext2D.cpp’ that is triggered when handling ‘<canvas>’ element dimensions. This may allow a context-dependent attacker to cause a buffer overflow and potentially execute arbitrary code.
A use-after-free error exists in the ‘HTMLInputElement::Focus()’ function in ‘dom/html/HTMLInputElement.cpp’ that is triggered when deleting input elements during a mutation event handler. This may allow a context-dependent attacker to dereference already freed memory and potentially execute arbitrary code.
An integer overflow condition exists in ‘gfx/2d/ssse3-scaler.c’ within the Supplemental Streaming SIMD Extensions 3 (SSSE3) scaler that is triggered when handling graphics operations. This may allow a context-dependent attacker to potentially execute arbitrary code.
A flaw exists that is triggered when capturing a media stream and the media source type is changed. This may allow a context-dependent attacker to potentially execute arbitrary code.
A use-after-free error exists that is triggered when using scripts to perform mutations to move DOM nodes between documents. This may allow a context-dependent attacker to dereference already freed memory and potentially execute arbitrary code.
A flaw exists when handling 307 redirects as HTTP requests to NPAPI plugins do not require multiple steps, explicit confirmation, or a unique token when performing certain sensitive actions. By tricking a user into following a specially crafted link, a context-dependent attacker can perform a Cross-Site Request Forgery (CSRF / XSRF) attack causing the victim to perform unspecified actions.
An unspecified flaw exists in ‘netwerk/sctp/datachannel/DataChannel.cpp’ that is triggered as certain input is not properly validated. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code.
An out-of-bounds access flaw exists in ‘webrtc/modules/video_coding/rtp_frame_reference_finder.cc’ that is triggered as certain input is not properly validated when handling VP9 missing frame processing. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code.
A race condition exists in ‘js/src/gc/GC.cpp’ that is triggered as certain input is not properly validated. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code.
An unspecified flaw exists in ‘xpcom/ds/Observer.h’ that is triggered as certain input is not properly validated. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code.
An unspecified flaw exists in ‘js/src/frontend/BytecodeEmitter.cpp’ that is triggered as certain input is not properly validated. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code.
A flaw exists in the ‘GCMarker::markDelayedChildren()’ function in ‘js/src/gc/Marking.cpp’ that is triggered as certain input is not properly validated. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code.
An unspecified flaw exists in the ‘nsMozIconURI::Deserialize()’ function in ‘image/decoders/icon/nsIconURI.cpp’ that is triggered as certain input is not properly validated. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code.
An unspecified flaw exists that is triggered when managing physical audio devices. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code.
A flaw exists in the ‘FromIPCSegment()’ function in ‘netwerk/base/nsStandardURL.cpp’ that is triggered as certain input is not properly validated. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code.
An unspecified flaw exists in ‘dom/base/StructuredCloneHolder.cpp’ that is triggered as certain input is not properly validated. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code.
An unspecified flaw exists in the ‘JS::Rooted()’ function in ‘dom/xbl/nsXBLBinding.cpp’ that is triggered as certain input is not properly validated. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code.
An unspecified flaw exists in ‘dom/canvas/WebGLContextDraw.cpp’ that is triggered as certain input is not properly validated. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code.
An unspecified flaw exists in ‘dom/media/PeerConnection.js’ that is triggered when handling ICE connection state changes. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code.
An unspecified flaw exists in ‘hal/Hal.cpp’ that is triggered as certain input is not properly validated. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code.
Mutliple vulnerabilities in the following may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code:
‘netwerk/sctp/datachannel/DataChannel.cpp’
‘xpcom/ds/Observer.h’
‘js/src/frontend/BytecodeEmitter.cpp’
‘nsMozIconURI::Deserialize()’
‘dom/base/StructuredCloneHolder.cpp’
‘dom/xbl/nsXBLBinding.cpp’
‘dom/canvas/WebGLContextDraw.cpp’
‘dom/media/PeerConnection.js’
‘hal/Hal.cpp’
Binary data 700341.prm
Vendor | Product | Version | CPE |
---|---|---|---|
mozilla | firefox_esr | cpe:/a:mozilla:firefox_esr |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12359
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12360
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12362
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12363
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12364
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12365
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12366
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12367
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12368
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12369
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12371
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5156
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5187
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5188
www.nessus.org/u?aa11dad9