7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.005 Low
EPSS
Percentile
76.9%
Severity: Critical
Date : 2018-07-16
CVE-ID : CVE-2018-5188 CVE-2018-12359 CVE-2018-12360 CVE-2018-12362
CVE-2018-12363 CVE-2018-12364 CVE-2018-12365 CVE-2018-12366
CVE-2018-12372 CVE-2018-12373 CVE-2018-12374
Package : thunderbird
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-728
The package thunderbird before version 52.9.1-1 is vulnerable to
multiple issues including arbitrary code execution, cross-site request
forgery and information disclosure.
Upgrade to 52.9.1-1.
The problems have been fixed upstream in version 52.9.1.
None.
Several memory safety bugs have been found in Firefox before 61.0 and
Thunderbird before 52.9. Some of these bugs showed evidence of memory
corruption and Mozilla presumes that with enough effort some of these
could be exploited to run arbitrary code.
A buffer overflow can occur in Firefox before 61.0 and Thunderbird
before 52.9 when rendering canvas content while adjusting the height
and width of the <canvas> element dynamically, causing data to be
written outside of the currently computed boundaries. This results in a
potentially exploitable crash.
A use-after-free vulnerability can occur in Firefox before 61.0 and
Thunderbird before 52.9 when deleting an input element during a
mutation event handler triggered by focusing that element. This results
in a potentially exploitable crash.
An integer overflow can occur in Firefox before 61.0 and Thunderbird
before 52.9 during graphics operations done by the Supplemental
Streaming SIMD Extensions 3 (SSSE3) scaler, resulting in a potentially
exploitable crash.
A use-after-free vulnerability can occur in Firefox before 61.0 and
Thunderbird before 52.9 when script uses mutation events to move DOM
nodes between documents, resulting in the old document that held the
node being freed but the node still having a pointer referencing it.
This results in a potentially exploitable crash.
A security issue has been found in Firefox before 61.0 and Thunderbird
before 52.9, where NPAPI plugins, such as Adobe Flash, can send non-
simple cross-origin requests, bypassing CORS by making a same-origin
POST that does a 307 redirect to the target site. This allows for a
malicious site to engage in cross-site request forgery (CSRF) attacks.
A security issue has been found in Firefox before 61.0 and Thunderbird
before 52.9 where a compromised IPC child process can escape the
content sandbox and list the names of arbitrary files on the file
system without user consent or interaction. This could result in
exposure of private local files.
An invalid grid size during QCMS (color profile) transformations can
result in the out-of-bounds read interpreted as a float value, in
Firefox before 61.0 and Thunderbird before 52.9. This could leak
private data into the output.
A security issue has been found in Thunderbird before 52.9, where
decrypted S/MIME parts, when included in HTML crafted for an attack,
can leak plaintext when included in a HTML reply/forward.
A security issue has been found in Thunderbird before 52.9, where
S/MIME parts hidden with CSS or <plaintext> can leak plaintext when
included in a HTML reply/forward.
A security issue has been found in Thunderbird before 52.9, where
plaintext of decrypted emails can leak through by user submitting an
embedded form by pressing enter key within a text input field.
A remote attacker can access sensitive information, bypass various
security mechanisms and execute arbitrary code on the affected host.
https://www.mozilla.org/en-US/security/advisories/mfsa2018-18
https://www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-5188
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1456189%2C1456975%2C1465898%2C1392739%2C1451297%2C1464063%2C1437842%2C1442722%2C1452576%2C1450688%2C1458264%2C1458270%2C1465108%2C1464829%2C1464079%2C1463494%2C1458048
https://www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12359
https://bugzilla.mozilla.org/show_bug.cgi?id=1459162
https://www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12360
https://bugzilla.mozilla.org/show_bug.cgi?id=1459693
https://www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12362
https://bugzilla.mozilla.org/show_bug.cgi?id=1452375
https://www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12363
https://bugzilla.mozilla.org/show_bug.cgi?id=1464784
https://www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12364
https://bugzilla.mozilla.org/show_bug.cgi?id=1436241
https://www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12365
https://bugzilla.mozilla.org/show_bug.cgi?id=1459206
https://www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12366
https://bugzilla.mozilla.org/show_bug.cgi?id=1464039
https://www.mozilla.org/en-US/security/advisories/mfsa2018-18/#CVE-2018-12372
https://bugzilla.mozilla.org/show_bug.cgi?id=1419417
https://www.mozilla.org/en-US/security/advisories/mfsa2018-18/#CVE-2018-12373
https://bugzilla.mozilla.org/show_bug.cgi?id=1464056
https://bugzilla.mozilla.org/show_bug.cgi?id=1464667
https://www.mozilla.org/en-US/security/advisories/mfsa2018-18/#CVE-2018-12374
https://bugzilla.mozilla.org/show_bug.cgi?id=1462910
https://security.archlinux.org/CVE-2018-5188
https://security.archlinux.org/CVE-2018-12359
https://security.archlinux.org/CVE-2018-12360
https://security.archlinux.org/CVE-2018-12362
https://security.archlinux.org/CVE-2018-12363
https://security.archlinux.org/CVE-2018-12364
https://security.archlinux.org/CVE-2018-12365
https://security.archlinux.org/CVE-2018-12366
https://security.archlinux.org/CVE-2018-12372
https://security.archlinux.org/CVE-2018-12373
https://security.archlinux.org/CVE-2018-12374
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ArchLinux | any | any | thunderbird | < 52.9.1-1 | UNKNOWN |
bugzilla.mozilla.org/buglist.cgi?bug_id=1456189%2C1456975%2C1465898%2C1392739%2C1451297%2C1464063%2C1437842%2C1442722%2C1452576%2C1450688%2C1458264%2C1458270%2C1465108%2C1464829%2C1464079%2C1463494%2C1458048
bugzilla.mozilla.org/show_bug.cgi?id=1419417
bugzilla.mozilla.org/show_bug.cgi?id=1436241
bugzilla.mozilla.org/show_bug.cgi?id=1452375
bugzilla.mozilla.org/show_bug.cgi?id=1459162
bugzilla.mozilla.org/show_bug.cgi?id=1459206
bugzilla.mozilla.org/show_bug.cgi?id=1459693
bugzilla.mozilla.org/show_bug.cgi?id=1462910
bugzilla.mozilla.org/show_bug.cgi?id=1464039
bugzilla.mozilla.org/show_bug.cgi?id=1464056
bugzilla.mozilla.org/show_bug.cgi?id=1464667
bugzilla.mozilla.org/show_bug.cgi?id=1464784
security.archlinux.org/AVG-728
security.archlinux.org/CVE-2018-12359
security.archlinux.org/CVE-2018-12360
security.archlinux.org/CVE-2018-12362
security.archlinux.org/CVE-2018-12363
security.archlinux.org/CVE-2018-12364
security.archlinux.org/CVE-2018-12365
security.archlinux.org/CVE-2018-12366
security.archlinux.org/CVE-2018-12372
security.archlinux.org/CVE-2018-12373
security.archlinux.org/CVE-2018-12374
security.archlinux.org/CVE-2018-5188
www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12359
www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12360
www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12362
www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12363
www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12364
www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12365
www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12366
www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-5188
www.mozilla.org/en-US/security/advisories/mfsa2018-18
www.mozilla.org/en-US/security/advisories/mfsa2018-18/#CVE-2018-12372
www.mozilla.org/en-US/security/advisories/mfsa2018-18/#CVE-2018-12373
www.mozilla.org/en-US/security/advisories/mfsa2018-18/#CVE-2018-12374
7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.005 Low
EPSS
Percentile
76.9%