SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (E-mail Client)  >   Mozilla Thunderbird Vendors:   Mozilla.org
(Oracle Issues Fix for Oracle Linux for Mozilla Thunderbird) Mozilla Firefox Multiple Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks, Bypass Security Restrictions, Obtain Potentially Sensitive Information, and Execute Arbitrary Code
SecurityTracker Alert ID:  1041381
SecurityTracker URL:  http://securitytracker.com/id/1041381
CVE Reference:   CVE-2018-12359, CVE-2018-12363, CVE-2018-12364, CVE-2018-12366   (Links to External Site)
Date:  Jul 26 2018
Impact:   Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   Multiple vulnerabilities were reported in Mozilla Firefox. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site request forgery attacks. A remote user can bypass security controls on the target system. A remote user can obtain potentially sensitive information on the target system. Mozilla Thunderbird is affected.

A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system.

A buffer overflow may occur when rendering canvas content [CVE-2018-12359].

A use-after-free memory error may occur when using focus() [CVE-2018-12360].

An integer overflow may occur in the SwizzleData code while calculating buffer sizes [CVE-2018-12361].

An integer overflow may occur during graphics operations in the Supplemental Streaming SIMD Extensions 3 (SSSE3) scaler [CVE-2018-12362].

A segmentation fault may occur in the media recorder when the track type is changed during capture [CVE-2018-5156].

A use-after-free memory error may occur when script uses mutation events to append DOM nodes [CVE-2018-12363].

An integer overflow may occur in the Skia library when allocating memory for edge builders on some systems with at least 16 GB of RAM [CVE-2018-12371].

Other memory corruption errors may occur [CVE-2018-5186].

The browser does not warn users when opening executable files with the SettingContent-ms extension [CVE-2018-12368]. Windows-based systems are affected.

WebExtensions bundled with embedded experiments do not properly check access controls. A WebExtension can gain full browser permissions [CVE-2018-12369].

An NPAPI plugin can send non-simple requests to bypass cross-origin restrictions and conduct cross-site request forgery (CSRF) attacks [CVE-2018-12364].

An IPC child process can escape the content sandbox and list the names of arbitrary files on the file system [CVE-2018-12365].

An out-of-bounds memory read error may occur during QCMS color profile transformations [CVE-2018-12366].

The PerformanceNavigationTiming method can be used as a precision timer to attempt to bypass Spectre mitigations [CVE-2018-12367].

SameSite cookie protections are not validated in Reader View. A user can bypass cross-site request forgery protection [CVE-2018-12370].

A remote user can bypass same-origin restrictions via service workers and redirection [CVE-2018-12358].

Abdulrahman Alqabandi, Alex Gaynor, Andrea Marchesini, Ben Kelly, Boris Zbarsky, Christian Holler, Christoph Diehl, David Black, David Major, F. Alonso (revskills), Gary Kwong, Jason Kratzer, Jean-Yves Avenard, Jon Coppeard, Jonathan Kingston, Jun Kokatsu, Marcia Knous, Nicolas B. Pierron, Nils, Nils Ohlmeier, OSS-Fuzz, R, Randell Jesup, Ronald Crane, Sebastian Hengst, Ted Campbell, and anonymous reported these vulnerabilities.

Impact:   A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.

A remote user can take actions on the target system acting as the target authenticated user.

A remote user can bypass security controls on the target system.

A remote user can obtain potentially sensitive information on the target system.

Solution:   Oracle has issued a fix for CVE-2018-12359, CVE-2018-12363, CVE-2018-12364, and CVE-2018-12366 for Mozilla Thunderbird.

The Oracle Linux advisory is available at:

http://linux.oracle.com/errata/ELSA-2018-2252.html

Vendor URL:  linux.oracle.com/errata/ELSA-2018-2252.html (Links to External Site)
Cause:   Access control error, Boundary error, Input validation error
Underlying OS:  Linux (Oracle)
Underlying OS Comments:  7

Message History:   This archive entry is a follow-up to the message listed below.
Jun 27 2018 Mozilla Firefox Multiple Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks, Bypass Security Restrictions, Obtain Potentially Sensitive Information, and Execute Arbitrary Code



 Source Message Contents

Subject:  [El-errata] ELSA-2018-2252 Important: Oracle Linux 7 thunderbird security update

Oracle Linux Security Advisory ELSA-2018-2252

http://linux.oracle.com/errata/ELSA-2018-2252.html

The following updated rpms for Oracle Linux 7 have been uploaded to the 
Unbreakable Linux Network:

x86_64:
thunderbird-52.9.1-1.0.1.el7_5.x86_64.rpm


SRPMS:
http://oss.oracle.com/ol7/SRPMS-updates/thunderbird-52.9.1-1.0.1.el7_5.src.rpm



Description of changes:

[52.9.1-1.0.1]
- Replaced thunderbird-redhat-default-prefs.js with 
thunderbird-oracle-default-prefs.js

[52.9.1-1]
- Update to 52.9.1

_______________________________________________
El-errata mailing list
El-errata@oss.oracle.com
https://oss.oracle.com/mailman/listinfo/el-errata
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC