Mozilla Foundation Security Advisory 2018-31
Security vulnerabilities fixed in Thunderbird 60.4
- Announced
- December 21, 2018
- Impact
- critical
- Products
- Thunderbird
- Fixed in
-
- Thunderbird 60.4
In general, these flaws cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but are potentially risks in browser or browser-like contexts.
#CVE-2018-17466: Buffer overflow and out-of-bounds read in ANGLE library with TextureStorage11
- Reporter
- Omair
- Impact
- high
Description
A buffer overflow and out-of-bounds read can occur in TextureStorage11
within the ANGLE graphics library, used for WebGL content. This results in a potentially exploitable crash.
References
#CVE-2018-18492: Use-after-free with select element
- Reporter
- Nils
- Impact
- high
Description
A use-after-free vulnerability can occur after deleting a selection element due to a weak reference to the select
element in the options
collection. This results in a potentially exploitable crash.
References
#CVE-2018-18493: Buffer overflow in accelerated 2D canvas with Skia
- Reporter
- Atte Kettunen
- Impact
- high
Description
A buffer overflow can occur in the Skia library during buffer offset calculations with hardware accelerated canvas 2D actions due to the use of 32-bit calculations instead of 64-bit. This results in a potentially exploitable crash.
References
#CVE-2018-18494: Same-origin policy violation using location attribute and performance.getEntries to steal cross-origin URLs
- Reporter
- James Lee of Kryptos Logic
- Impact
- high
Description
A same-origin policy violation allowing the theft of cross-origin URL entries when using the Javascript location
property to cause a redirection to another site using performance.getEntries()
. This is a same-origin policy violation and could allow for data theft.
References
#CVE-2018-18498: Integer overflow when calculating buffer sizes for images
- Reporter
- R at Zero Day LLC
- Impact
- low
Description
A potential vulnerability leading to an integer overflow can occur during buffer size calculations for images when a raw value is used instead of the checked value. This leads to a possible out-of-bounds write.
References
#CVE-2018-12405: Memory safety bugs fixed in Firefox 64, Firefox ESR 60.4, and Thunderbird 60.4
- Reporter
- Mozilla developers and community
- Impact
- critical
Description
Mozilla developers and community members Christian Holler, Diego Calleja, Andrew McCreight, Jon Coppeard, Jed Davis, Natalia Csoregi, Nicolas B. Pierron, and Tyson Smith reported memory safety bugs present in Firefox 63 and Firefox ESR 60.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code.