Unrated severityNVD Advisory· Published Oct 18, 2018· Updated Aug 5, 2024
CVE-2018-12361
CVE-2018-12361
Description
An integer overflow can occur in the SwizzleData code while calculating buffer sizes. The overflowed value is used for subsequent graphics computations when their inputs are not sanitized which results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60, Firefox ESR < 60.1, and Firefox < 61.
Affected products
8- osv-coords5 versionspkg:rpm/opensuse/firefox-esr&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/MozillaFirefox&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/MozillaThunderbird&distro=openSUSE%20Tumbleweedpkg:rpm/suse/MozillaThunderbird&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015pkg:rpm/suse/MozillaThunderbird&distro=SUSE%20Package%20Hub%2012
< 128.5.1-1.1+ 4 more
- (no CPE)range: < 128.5.1-1.1
- (no CPE)range: < 92.0-1.2
- (no CPE)range: < 91.1.1-1.1
- (no CPE)range: < 60.2.1-3.13.1
- (no CPE)range: < 60.3.0-74.2
- Range: unspecified
- Range: unspecified
- Range: unspecified
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
11- security.gentoo.org/glsa/201810-01mitrevendor-advisoryx_refsource_GENTOO
- security.gentoo.org/glsa/201811-13mitrevendor-advisoryx_refsource_GENTOO
- usn.ubuntu.com/3705-1/mitrevendor-advisoryx_refsource_UBUNTU
- www.debian.org/security/2018/dsa-4295mitrevendor-advisoryx_refsource_DEBIAN
- www.securityfocus.com/bid/104558mitrevdb-entryx_refsource_BID
- www.securitytracker.com/id/1041193mitrevdb-entryx_refsource_SECTRACK
- bugzilla.mozilla.org/show_bug.cgimitrex_refsource_CONFIRM
- lists.debian.org/debian-lts-announce/2018/11/msg00011.htmlmitremailing-listx_refsource_MLIST
- www.mozilla.org/security/advisories/mfsa2018-15/mitrex_refsource_CONFIRM
- www.mozilla.org/security/advisories/mfsa2018-16/mitrex_refsource_CONFIRM
- www.mozilla.org/security/advisories/mfsa2018-19/mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.