First published: Fri Sep 21 2018(Updated: )
A potentially exploitable crash in `TransportSecurityInfo` used for SSL can be triggered by data stored in the local cache in the user profile directory. This issue is only exploitable in combination with another vulnerability allowing an attacker to write data into the local cache or from locally installed malware. This issue also triggers a non-exploitable startup crash for users switching between the Nightly and Release versions of Firefox if the same profile is used. External Reference: <a href="https://www.mozilla.org/en-US/security/advisories/mfsa2018-23/#CVE-2018-12385">https://www.mozilla.org/en-US/security/advisories/mfsa2018-23/#CVE-2018-12385</a>
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =7.5 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Red Hat Enterprise Linux Workstation | =7.0 | |
Debian | =8.0 | |
Debian | =9.0 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Firefox | <62.0.2 | |
Firefox ESR | <60.2.1 | |
Thunderbird | <60.2.1 | |
Thunderbird | <60.2.1 | 60.2.1 |
Firefox | <62.0.2 | 62.0.2 |
Firefox ESR | <60.2.1 | 60.2.1 |
debian/firefox | 135.0.1-1 | |
debian/firefox-esr | 115.14.0esr-1~deb11u1 128.7.0esr-1~deb11u1 128.5.0esr-1~deb12u1 128.7.0esr-1~deb12u1 128.7.0esr-1 | |
debian/thunderbird | 1:115.12.0-1~deb11u1 1:128.7.0esr-1~deb11u1 1:128.5.0esr-1~deb12u1 1:128.7.0esr-1~deb12u1 1:128.7.0esr-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2018-12385 has been classified as having moderate severity due to the potential for crash exploitation under specific conditions.
To address CVE-2018-12385, users should update to the latest version of affected software such as Thunderbird, Firefox, or their respective ESR versions.
CVE-2018-12385 impacts Mozilla Thunderbird and Firefox up to version 60.2.1, as well as Firefox ESR versions up to 60.2.1.
CVE-2018-12385 is not directly exploitable remotely and typically requires an attacker to leverage another vulnerability to write data into local cache.
As of now, there are no known public exploits specifically targeting CVE-2018-12385.