CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
EPSS
Percentile
59.3%
A lack of parameter validation on IPC messages results in a potential
out-of-bounds write through malformed IPC messages. This can potentially
allow for sandbox escape through memory corruption in the parent process.
This vulnerability affects Thunderbird < 52.7, Firefox ESR < 52.7, and
Firefox < 59.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 17.10 | noarch | firefox | < 59.0+build5-0ubuntu0.17.10.1 | UNKNOWN |
ubuntu | 18.04 | noarch | firefox | < 59.0.1+build1-0ubuntu1 | UNKNOWN |
ubuntu | 14.04 | noarch | firefox | < 59.0+build5-0ubuntu0.14.04.1 | UNKNOWN |
ubuntu | 16.04 | noarch | firefox | < 59.0+build5-0ubuntu0.16.04.1 | UNKNOWN |
ubuntu | 17.10 | noarch | thunderbird | < 1:52.7.0+build1-0ubuntu0.17.10.1 | UNKNOWN |
ubuntu | 18.04 | noarch | thunderbird | < 1:52.7.0+build1-0ubuntu1 | UNKNOWN |
ubuntu | 14.04 | noarch | thunderbird | < 1:52.7.0+build1-0ubuntu0.14.04.1 | UNKNOWN |
ubuntu | 16.04 | noarch | thunderbird | < 1:52.7.0+build1-0ubuntu0.16.04.1 | UNKNOWN |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
EPSS
Percentile
59.3%