Mozilla Firefox ESR Bugs Let Remote Users Execute Arbitrary Code
|
SecurityTracker Alert ID: 1040898 |
SecurityTracker URL: http://securitytracker.com/id/1040898
|
CVE Reference:
CVE-2018-5178, CVE-2018-5183
(Links to External Site)
|
Date: May 10 2018
|
Impact:
Execution of arbitrary code via network, User access via network
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): prior to ESR 52.8
|
Description:
Two vulnerabilities were reported in Mozilla Firefox ESR. A remote user can cause arbitrary code to be executed on the target user's system.
A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system.
A buffer overflow may occur in UTF-8 to Unicode string conversion in vulnerable legacy extensions [CVE-2018-5178].
A memory corruption error may occur in the Skia library during graphic operations [CVE-2018-5183].
Mozilla Developers and Root Object reported these vulnerabilities.
|
Impact:
A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.
|
Solution:
The vendor has issued a fix (ESR 52.8).
The vendor advisory is available at:
https://www.mozilla.org/en-US/security/advisories/mfsa2018-12/
|
Vendor URL: www.mozilla.org/en-US/security/advisories/mfsa2018-12/ (Links to External Site)
|
Cause:
Access control error, Boundary error
|
Underlying OS: Linux (Any), UNIX (Any), Windows (Any)
|
|
Message History:
None.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|