CVE-2018-18498

Impact:
Important
Public Date:
2018-12-11
CWE:
CWE-190
Bugzilla:
1658402: CVE-2018-18498 Mozilla: Integer overflow when calculating buffer sizes for images

The MITRE CVE dictionary describes this issue as:

A potential vulnerability leading to an integer overflow can occur during buffer size calculations for images when a raw value is used instead of the checked value. This leads to a possible out-of-bounds write. This vulnerability affects Thunderbird < 60.4, Firefox ESR < 60.4, and Firefox < 64.

Find out more about CVE-2018-18498 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

In general, this flaw be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but are potentially risks in browser or browser-like contexts.

CVSS v3 metrics

CVSS3 Base Score 8.8
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector Network
Attack Complexity Low
Privileges Required None
User Interaction Required
Scope Unchanged
Confidentiality High
Integrity Impact High
Availability Impact High

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 6 (thunderbird) RHSA-2019:0159 2019-01-24
Red Hat Enterprise Linux 7 (thunderbird) RHSA-2019:0160 2019-01-24
Red Hat Enterprise Linux 6 (firefox) RHSA-2018:3831 2018-12-17
Red Hat Enterprise Linux 7 (firefox) RHSA-2018:3833 2018-12-17
Unless explicitly stated as not affected, all previous versions of packages in any minor update stream of a product listed here should be assumed vulnerable, although may not have been subject to full analysis.

Acknowledgements

Red Hat would like to thank the Mozilla project for reporting this issue. Upstream acknowledges r as the original reporter.

External References

Last Modified

CVE description copyright © 2017, The MITRE Corporation