First published: Wed Sep 05 2018(Updated: )
If a user saved passwords before Firefox 58 and then later set a master password, an unencrypted copy of these passwords is still accessible. This is because the older stored password file was not deleted when the data was copied to a new format starting in Firefox 58. The new master password is added only on the new file. This could allow the exposure of stored password data outside of user expectations.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =7.5 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Red Hat Enterprise Linux Workstation | =7.0 | |
Debian | =8.0 | |
Debian | =9.0 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Firefox | <62.0 | |
Firefox ESR | <60.2.1 | |
Thunderbird | <60.2.1 | |
Thunderbird | <60.2.1 | 60.2.1 |
Firefox | <62 | 62 |
Firefox ESR | <60.2.1 | 60.2.1 |
debian/firefox | 135.0.1-1 | |
debian/firefox-esr | 115.14.0esr-1~deb11u1 128.7.0esr-1~deb11u1 128.5.0esr-1~deb12u1 128.7.0esr-1~deb12u1 128.7.0esr-1 | |
debian/thunderbird | 1:115.12.0-1~deb11u1 1:128.7.0esr-1~deb11u1 1:128.5.0esr-1~deb12u1 1:128.7.0esr-1~deb12u1 1:128.7.0esr-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The severity of CVE-2018-12383 is classified as medium.
To fix CVE-2018-12383, users should update to Firefox 62 or later, or replace older installations of Thunderbird and Firefox ESR with versions 60.2.1 and above.
CVE-2018-12383 affects Mozilla Firefox versions prior to 62, Thunderbird versions prior to 60.2.1, and Firefox ESR versions prior to 60.2.1.
Yes, an unencrypted copy of previously saved passwords can still be accessed even after setting a master password due to this vulnerability.
No, it is not safe to continue using affected versions as they expose saved passwords to potential unauthorized access.