A vulnerability in register allocation in JavaScript can lead to type confusion, allowing for an arbitrary read and write. This leads to remote code execution inside the sandboxed content process when triggered. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.
References
Link | Resource |
---|---|
https://www.mozilla.org/security/advisories/mfsa2018-24/ | Vendor Advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1493900 | Exploit Issue Tracking Patch Vendor Advisory |
https://www.debian.org/security/2018/dsa-4310 | Third Party Advisory |
https://usn.ubuntu.com/3778-1/ | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:2884 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:2881 | Third Party Advisory |
http://www.securitytracker.com/id/1041770 | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/105460 | Third Party Advisory VDB Entry |
https://security.gentoo.org/glsa/201810-01 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Information
Published : 2018-10-18 06:29
Updated : 2018-12-06 10:31
NVD link : CVE-2018-12386
Mitre link : CVE-2018-12386
JSON object : View
CWE
CWE-704
Incorrect Type Conversion or Cast
Products Affected
redhat
- enterprise_linux_desktop
- enterprise_linux_server_aus
- enterprise_linux_workstation
- enterprise_linux_server_tus
- enterprise_linux_server_eus
- enterprise_linux_server
mozilla
- firefox_esr
- firefox
canonical
- ubuntu_linux
debian
- debian_linux