CVE-2018-5129

A lack of parameter validation on IPC messages results in a potential out-of-bounds write through malformed IPC messages. This can potentially allow for sandbox escape through memory corruption in the parent process. This vulnerability affects Thunderbird < 52.7, Firefox ESR < 52.7, and Firefox < 59.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.6 HIGH
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
mozillaCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 84%
VendorProductVersion
debiandebian_linux
7.0
debiandebian_linux
8.0
debiandebian_linux
9.0
mozillafirefox
𝑥
< 59.0
mozillafirefox_esr
𝑥
< 52.7.0
redhatenterprise_linux_desktop
6.0
redhatenterprise_linux_desktop
7.0
redhatenterprise_linux_server
6.0
redhatenterprise_linux_server
7.0
redhatenterprise_linux_server_aus
7.4
redhatenterprise_linux_server_eus
7.4
redhatenterprise_linux_server_eus
7.5
redhatenterprise_linux_workstation
6.0
redhatenterprise_linux_workstation
7.0
canonicalubuntu_linux
14.04
canonicalubuntu_linux
16.04
canonicalubuntu_linux
17.10
mozillathunderbird
𝑥
< 52.7.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
firefox
sid
132.0.1-1
fixed
firefox-esr
bullseye
115.14.0esr-1~deb11u1
fixed
bullseye (security)
128.4.0esr-1~deb11u1
fixed
bookworm
115.14.0esr-1~deb12u1
fixed
bookworm (security)
128.4.0esr-1~deb12u1
fixed
trixie
128.3.1esr-2
fixed
sid
128.4.0esr-1
fixed
thunderbird
bullseye
1:115.12.0-1~deb11u1
fixed
bullseye (security)
1:128.4.0esr-1~deb11u1
fixed
bookworm
1:115.12.0-1~deb12u1
fixed
bookworm (security)
1:115.16.0esr-1~deb12u1
fixed
sid
1:128.4.0esr-1
fixed
trixie
1:128.4.0esr-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
firefox
bionic
Fixed 59.0.1+build1-0ubuntu1
released
artful
Fixed 59.0+build5-0ubuntu0.17.10.1
released
xenial
Fixed 59.0+build5-0ubuntu0.16.04.1
released
trusty
Fixed 59.0+build5-0ubuntu0.14.04.1
released
thunderbird
bionic
Fixed 1:52.7.0+build1-0ubuntu1
released
artful
Fixed 1:52.7.0+build1-0ubuntu0.17.10.1
released
xenial
Fixed 1:52.7.0+build1-0ubuntu0.16.04.1
released
trusty
Fixed 1:52.7.0+build1-0ubuntu0.14.04.1
released
References