(Oracle Issues Fix for Oracle Linux for Mozilla Thunderbird) Mozilla Firefox Multiple Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks, Bypass Security Restrictions, Obtain Potentially Sensitive Information, and Execute Arbitrary Code
SecurityTracker Alert ID: 1041377|
SecurityTracker URL: http://securitytracker.com/id/1041377
CVE-2018-12359, CVE-2018-12363, CVE-2018-12364, CVE-2018-12366
(Links to External Site)
Date: Jul 26 2018
Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information, User access via network|
Fix Available: Yes Vendor Confirmed: Yes |
Multiple vulnerabilities were reported in Mozilla Firefox. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site request forgery attacks. A remote user can bypass security controls on the target system. A remote user can obtain potentially sensitive information on the target system. Mozilla Thunderbird is affected.|
A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system.
A buffer overflow may occur when rendering canvas content [CVE-2018-12359].
A use-after-free memory error may occur when using focus() [CVE-2018-12360].
An integer overflow may occur in the SwizzleData code while calculating buffer sizes [CVE-2018-12361].
An integer overflow may occur during graphics operations in the Supplemental Streaming SIMD Extensions 3 (SSSE3) scaler [CVE-2018-12362].
A segmentation fault may occur in the media recorder when the track type is changed during capture [CVE-2018-5156].
A use-after-free memory error may occur when script uses mutation events to append DOM nodes [CVE-2018-12363].
An integer overflow may occur in the Skia library when allocating memory for edge builders on some systems with at least 16 GB of RAM [CVE-2018-12371].
Other memory corruption errors may occur [CVE-2018-5186].
The browser does not warn users when opening executable files with the SettingContent-ms extension [CVE-2018-12368]. Windows-based systems are affected.
WebExtensions bundled with embedded experiments do not properly check access controls. A WebExtension can gain full browser permissions [CVE-2018-12369].
An NPAPI plugin can send non-simple requests to bypass cross-origin restrictions and conduct cross-site request forgery (CSRF) attacks [CVE-2018-12364].
An IPC child process can escape the content sandbox and list the names of arbitrary files on the file system [CVE-2018-12365].
An out-of-bounds memory read error may occur during QCMS color profile transformations [CVE-2018-12366].
The PerformanceNavigationTiming method can be used as a precision timer to attempt to bypass Spectre mitigations [CVE-2018-12367].
SameSite cookie protections are not validated in Reader View. A user can bypass cross-site request forgery protection [CVE-2018-12370].
A remote user can bypass same-origin restrictions via service workers and redirection [CVE-2018-12358].
Abdulrahman Alqabandi, Alex Gaynor, Andrea Marchesini, Ben Kelly, Boris Zbarsky, Christian Holler, Christoph Diehl, David Black, David Major, F. Alonso (revskills), Gary Kwong, Jason Kratzer, Jean-Yves Avenard, Jon Coppeard, Jonathan Kingston, Jun Kokatsu, Marcia Knous, Nicolas B. Pierron, Nils, Nils Ohlmeier, OSS-Fuzz, R, Randell Jesup, Ronald Crane, Sebastian Hengst, Ted Campbell, and anonymous reported these vulnerabilities.
A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.|
A remote user can take actions on the target system acting as the target authenticated user.
A remote user can bypass security controls on the target system.
A remote user can obtain potentially sensitive information on the target system.
Oracle has issued a fix for CVE-2018-12359, CVE-2018-12363, CVE-2018-12364, and CVE-2018-12366 for Mozilla Thunderbird.|
The Oracle Linux advisory is available at:
Vendor URL: linux.oracle.com/errata/ELSA-2018-2252.html (Links to External Site)
Access control error, Boundary error, Input validation error|
|Underlying OS: Linux (Oracle)|
|Underlying OS Comments: 7|
This archive entry is a follow-up to the message listed below.|
Source Message Contents
Subject: [El-errata] ELSA-2018-2252 Important: Oracle Linux 7 thunderbird security update (aarch64)|
Oracle Linux Security Advisory ELSA-2018-2252
The following updated rpms for Oracle Linux 7 have been uploaded to the
Unbreakable Linux Network:
Description of changes:
- Replaced thunderbird-redhat-default-prefs.js with
- Update to 52.9.1
El-errata mailing list
Go to the Top of This SecurityTracker Archive Page