A buffer overflow was found during UTF8 to Unicode string conversion within JavaScript with extremely large amounts of data. This vulnerability requires the use of a malicious or vulnerable legacy extension in order to occur. This vulnerability affects Thunderbird ESR < 52.8, Thunderbird < 52.8, and Firefox ESR < 52.8.
CPE | Name | Operator | Version |
---|---|---|---|
ubuntu_linux | eq | 16.04 | |
ubuntu_linux | eq | 14.04 | |
ubuntu_linux | eq | 17.10 | |
ubuntu_linux | eq | 18.04 | |
debian_linux | eq | 8.0 | |
debian_linux | eq | 7.0 | |
debian_linux | eq | 9.0 | |
firefox_esr | lt | 52.8.0 | |
thunderbird | lt | 52.8.0 | |
thunderbird_esr | lt | 52.8.0 |
www.securityfocus.com/bid/104138
www.securitytracker.com/id/1040898
access.redhat.com/errata/RHSA-2018:1414
access.redhat.com/errata/RHSA-2018:1415
access.redhat.com/errata/RHSA-2018:1725
access.redhat.com/errata/RHSA-2018:1726
bugzilla.mozilla.org/show_bug.cgi?id=1443891
lists.debian.org/debian-lts-announce/2018/05/msg00007.html
lists.debian.org/debian-lts-announce/2018/05/msg00013.html
security.gentoo.org/glsa/201810-01
security.gentoo.org/glsa/201811-13
usn.ubuntu.com/3660-1/
www.debian.org/security/2018/dsa-4199
www.debian.org/security/2018/dsa-4209
www.mozilla.org/security/advisories/mfsa2018-12/
www.mozilla.org/security/advisories/mfsa2018-13/