Vulnerability Name: | CVE-2018-12406 (CCN-154154) | ||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2018-12-11 | ||||||||||||||||||||||||||||||||||||||||||||
Published: | 2018-12-11 | ||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2019-03-01 | ||||||||||||||||||||||||||||||||||||||||||||
Summary: | Mozilla developers and community members reported memory safety bugs present in Firefox 63. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 64. | ||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 7.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
7.7 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-119 | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2018-12406 Source: BID Type: Third Party Advisory 106167 Source: CONFIRM Type: Exploit, Issue Tracking, Vendor Advisory https://bugzilla.mozilla.org/buglist.cgi?bug_id=1456947%2C1475669%2C1504816%2C1502886%2C1500064%2C1500310%2C1500696%2C1499198%2C1434490%2C1481745%2C1458129 Source: XF Type: UNKNOWN firefox-cve201812406-code-exec(154154) Source: UBUNTU Type: Third Party Advisory USN-3844-1 Source: CCN Type: Mozilla Foundation Security Advisory 2018-29 Security vulnerabilities fixed in Firefox 64 Source: CONFIRM Type: Exploit, Vendor Advisory https://www.mozilla.org/security/advisories/mfsa2018-29/ Source: CCN Type: WhiteSource Vulnerability Database CVE-2018-12406 | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||
BACK |