CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
68.9%
A buffer overflow can occur when rendering canvas content while adjusting the height and width of the canvas element dynamically, causing data to be written outside of the currently computed boundaries. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
Vendor | Product | Version | CPE |
---|---|---|---|
redhat | enterprise_linux_desktop | 6.0 | cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* |
redhat | enterprise_linux_desktop | 7.0 | cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* |
redhat | enterprise_linux_server | 6.0 | cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* |
redhat | enterprise_linux_server | 7.0 | cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* |
redhat | enterprise_linux_server_aus | 7.6 | cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:* |
redhat | enterprise_linux_server_eus | 7.5 | cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:* |
redhat | enterprise_linux_server_eus | 7.6 | cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:* |
redhat | enterprise_linux_server_tus | 7.6 | cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:* |
redhat | enterprise_linux_workstation | 6.0 | cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* |
redhat | enterprise_linux_workstation | 7.0 | cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* |
[
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "60",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"lessThan": "52.9",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Firefox ESR",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "60.1",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"lessThan": "52.9",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Firefox",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "61",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
]
www.securityfocus.com/bid/104555
www.securitytracker.com/id/1041193
access.redhat.com/errata/RHSA-2018:2112
access.redhat.com/errata/RHSA-2018:2113
access.redhat.com/errata/RHSA-2018:2251
access.redhat.com/errata/RHSA-2018:2252
bugzilla.mozilla.org/show_bug.cgi?id=1459162
lists.debian.org/debian-lts-announce/2018/06/msg00014.html
lists.debian.org/debian-lts-announce/2018/07/msg00013.html
security.gentoo.org/glsa/201810-01
security.gentoo.org/glsa/201811-13
usn.ubuntu.com/3705-1/
usn.ubuntu.com/3714-1/
www.debian.org/security/2018/dsa-4235
www.debian.org/security/2018/dsa-4244
www.mozilla.org/security/advisories/mfsa2018-15/
www.mozilla.org/security/advisories/mfsa2018-16/
www.mozilla.org/security/advisories/mfsa2018-17/
www.mozilla.org/security/advisories/mfsa2018-18/
www.mozilla.org/security/advisories/mfsa2018-19/
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
68.9%