First published: Tue Jun 26 2018(Updated: )
An integer overflow can occur in the SwizzleData code while calculating buffer sizes. The overflowed value is used for subsequent graphics computations when their inputs are not sanitized which results in a potentially exploitable crash.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <61.0 | |
Firefox ESR | <60.1 | |
Thunderbird | <60.0 | |
Debian | =8.0 | |
Debian | =9.0 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =17.10 | |
Ubuntu | =18.04 | |
Thunderbird | <60 | 60 |
Firefox | <61 | 61 |
Firefox ESR | <60.1 | 60.1 |
debian/firefox | 135.0.1-1 | |
debian/thunderbird | 1:115.12.0-1~deb11u1 1:128.7.0esr-1~deb11u1 1:128.5.0esr-1~deb12u1 1:128.7.0esr-1~deb12u1 1:128.7.0esr-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2018-12361 is considered a high severity vulnerability due to the potential for an exploitable crash in affected software.
To fix CVE-2018-12361, update to the latest version of the affected software, such as Mozilla Thunderbird 60.1 or later.
CVE-2018-12361 affects Mozilla Thunderbird versions prior to 60, Firefox ESR versions prior to 60.1, and Firefox versions prior to 61.
Yes, CVE-2018-12361 can lead to further exploits as the integer overflow can be leveraged for additional attacks.
Yes, CVE-2018-12361 is documented in Mozilla's security advisories and can be found in their official bulletins.