CVE-2018-18498

NameCVE-2018-18498
DescriptionA potential vulnerability leading to an integer overflow can occur during buffer size calculations for images when a raw value is used instead of the checked value. This leads to a possible out-of-bounds write. This vulnerability affects Thunderbird < 60.4, Firefox ESR < 60.4, and Firefox < 64.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1605-1, DLA-1624-1, DSA-4354-1, DSA-4362-1
NVD severityhigh

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
firefox (PTS)sid79.0-1fixed
firefox-esr (PTS)stretch68.10.0esr-1~deb9u1fixed
stretch (security)68.11.0esr-1~deb9u1fixed
buster68.10.0esr-1~deb10u1fixed
buster (security)68.11.0esr-1~deb10u1fixed
bullseye, sid68.11.0esr-1fixed
thunderbird (PTS)stretch1:68.10.0-1~deb9u1fixed
stretch (security)1:68.11.0-1~deb9u1fixed
buster1:68.10.0-1~deb10u1fixed
buster (security)1:68.11.0-1~deb10u1fixed
bullseye, sid1:68.11.0-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
firefoxsource(unstable)64.0-1
firefox-esrsourcejessie60.4.0esr-1~deb8u1DLA-1605-1
firefox-esrsourcestretch60.4.0esr-1~deb9u1DSA-4354-1
firefox-esrsource(unstable)60.4.0esr-1
thunderbirdsourcejessie1:60.4.0-1~deb8u1DLA-1624-1
thunderbirdsourcestretch1:60.4.0-1~deb9u1DSA-4362-1
thunderbirdsource(unstable)1:60.4.0-1

Notes

https://www.mozilla.org/en-US/security/advisories/mfsa2018-29/#CVE-2018-18498
https://www.mozilla.org/en-US/security/advisories/mfsa2018-30/#CVE-2018-18498
https://www.mozilla.org/en-US/security/advisories/mfsa2018-31/#CVE-2018-18498

Search for package or bug name: Reporting problems